h1

h2

h3

h4

h5
h6
000995553 001__ 995553
000995553 005__ 20260129064054.0
000995553 0247_ $$2ISBN$$a978-3-031-64170-1
000995553 0247_ $$2ISBN$$a978-3-031-64171-8
000995553 0247_ $$2ISSN$$a0302-9743
000995553 0247_ $$2ISSN$$a1611-3349
000995553 0247_ $$2SCOPUS$$aSCOPUS:2-s2.0-85200659993
000995553 0247_ $$2WOS$$aWOS:001314363700020
000995553 0247_ $$2doi$$a10.1007/978-3-031-64171-8_20
000995553 037__ $$aRWTH-2024-09988
000995553 041__ $$aEnglish
000995553 1001_ $$0P:(DE-82)IDM03987$$aDrichel, Arthur$$b0$$eCorresponding author$$urwth
000995553 1112_ $$a21. International Conference International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment$$cLausanne$$d2024-07-17 - 2024-07-19$$gDIMVA 2024$$wSwitzerland
000995553 245__ $$aExtended Abstract: A Transfer Learning-Based Training Approach for DGA Classification$$honline
000995553 260__ $$aCham$$bSpringer$$c2024
000995553 29510 $$aDetection of intrusions and malware, and vulnerability assessment : 21st international conference, DIMVA 2024, Lausanne, Switzerland, July 17-19, 2024 : proceedings / Federico Maggi, Manuel Egele, Mathias Payer, Michele Carminati, editors
000995553 300__ $$a381-391
000995553 3367_ $$033$$2EndNote$$aConference Paper
000995553 3367_ $$0PUB:(DE-HGF)1$$2PUB:(DE-HGF)$$aAbstract$$babstract$$mabstract$$xExtended abstract
000995553 3367_ $$0PUB:(DE-HGF)7$$2PUB:(DE-HGF)$$aContribution to a book
000995553 3367_ $$0PUB:(DE-HGF)8$$2PUB:(DE-HGF)$$aContribution to a conference proceedings
000995553 3367_ $$2BibTeX$$aINPROCEEDINGS
000995553 3367_ $$2DRIVER$$aconferenceObject
000995553 3367_ $$2DataCite$$aOutput Types/Conference Abstract
000995553 3367_ $$2ORCID$$aOTHER
000995553 4900_ $$aLecture notes in computer science$$v14828
000995553 500__ $$aFirst Online: 09 July 2024
000995553 588__ $$aDataset connected to CrossRef Book Series, Journals: publications.rwth-aachen.de
000995553 591__ $$aGermany
000995553 7001_ $$0P:(DE-82)IDM07060$$aEdler von Querfurth, Benedikt$$b1$$urwth
000995553 7001_ $$0P:(DE-82)IDM05900$$aMeyer, Ulrike Michaela$$b2$$urwth
000995553 909CO $$ooai:publications.rwth-aachen.de:995553$$pVDB
000995553 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)IDM03987$$aRWTH Aachen$$b0$$kRWTH
000995553 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)IDM07060$$aRWTH Aachen$$b1$$kRWTH
000995553 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)IDM05900$$aRWTH Aachen$$b2$$kRWTH
000995553 9141_ $$y2024
000995553 9151_ $$0StatID:(DE-HGF)0031$$2StatID$$aPeer reviewed article$$x0
000995553 915__ $$0StatID:(DE-HGF)0200$$2StatID$$aDBCoverage$$bSCOPUS$$d2023-09-03
000995553 915__ $$0StatID:(DE-HGF)0420$$2StatID$$aNationallizenz$$d2023-09-03$$wger
000995553 9201_ $$0I:(DE-82)123520_20140620$$k123520$$lLehr- und Forschungsgebiet IT-Sicherheit$$x0
000995553 9201_ $$0I:(DE-82)120000_20140620$$k120000$$lFachgruppe Informatik$$x1
000995553 9201_ $$0I:(DE-82)121710_20140620$$k121710$$lLehrstuhl für Kommunikation und verteilte Systeme (Informatik 4)$$x2
000995553 961__ $$c2024-10-22T14:16:12.724586$$x2024-10-22T14:16:12.724586$$z2024-10-23
000995553 980__ $$aI:(DE-82)120000_20140620
000995553 980__ $$aI:(DE-82)121710_20140620
000995553 980__ $$aI:(DE-82)123520_20140620
000995553 980__ $$aUNRESTRICTED
000995553 980__ $$aVDB
000995553 980__ $$aabstract
000995553 980__ $$acontb
000995553 980__ $$acontrib