000995553 001__ 995553 000995553 005__ 20260129064054.0 000995553 0247_ $$2ISBN$$a978-3-031-64170-1 000995553 0247_ $$2ISBN$$a978-3-031-64171-8 000995553 0247_ $$2ISSN$$a0302-9743 000995553 0247_ $$2ISSN$$a1611-3349 000995553 0247_ $$2SCOPUS$$aSCOPUS:2-s2.0-85200659993 000995553 0247_ $$2WOS$$aWOS:001314363700020 000995553 0247_ $$2doi$$a10.1007/978-3-031-64171-8_20 000995553 037__ $$aRWTH-2024-09988 000995553 041__ $$aEnglish 000995553 1001_ $$0P:(DE-82)IDM03987$$aDrichel, Arthur$$b0$$eCorresponding author$$urwth 000995553 1112_ $$a21. International Conference International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment$$cLausanne$$d2024-07-17 - 2024-07-19$$gDIMVA 2024$$wSwitzerland 000995553 245__ $$aExtended Abstract: A Transfer Learning-Based Training Approach for DGA Classification$$honline 000995553 260__ $$aCham$$bSpringer$$c2024 000995553 29510 $$aDetection of intrusions and malware, and vulnerability assessment : 21st international conference, DIMVA 2024, Lausanne, Switzerland, July 17-19, 2024 : proceedings / Federico Maggi, Manuel Egele, Mathias Payer, Michele Carminati, editors 000995553 300__ $$a381-391 000995553 3367_ $$033$$2EndNote$$aConference Paper 000995553 3367_ $$0PUB:(DE-HGF)1$$2PUB:(DE-HGF)$$aAbstract$$babstract$$mabstract$$xExtended abstract 000995553 3367_ $$0PUB:(DE-HGF)7$$2PUB:(DE-HGF)$$aContribution to a book 000995553 3367_ $$0PUB:(DE-HGF)8$$2PUB:(DE-HGF)$$aContribution to a conference proceedings 000995553 3367_ $$2BibTeX$$aINPROCEEDINGS 000995553 3367_ $$2DRIVER$$aconferenceObject 000995553 3367_ $$2DataCite$$aOutput Types/Conference Abstract 000995553 3367_ $$2ORCID$$aOTHER 000995553 4900_ $$aLecture notes in computer science$$v14828 000995553 500__ $$aFirst Online: 09 July 2024 000995553 588__ $$aDataset connected to CrossRef Book Series, Journals: publications.rwth-aachen.de 000995553 591__ $$aGermany 000995553 7001_ $$0P:(DE-82)IDM07060$$aEdler von Querfurth, Benedikt$$b1$$urwth 000995553 7001_ $$0P:(DE-82)IDM05900$$aMeyer, Ulrike Michaela$$b2$$urwth 000995553 909CO $$ooai:publications.rwth-aachen.de:995553$$pVDB 000995553 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)IDM03987$$aRWTH Aachen$$b0$$kRWTH 000995553 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)IDM07060$$aRWTH Aachen$$b1$$kRWTH 000995553 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)IDM05900$$aRWTH Aachen$$b2$$kRWTH 000995553 9141_ $$y2024 000995553 9151_ $$0StatID:(DE-HGF)0031$$2StatID$$aPeer reviewed article$$x0 000995553 915__ $$0StatID:(DE-HGF)0200$$2StatID$$aDBCoverage$$bSCOPUS$$d2023-09-03 000995553 915__ $$0StatID:(DE-HGF)0420$$2StatID$$aNationallizenz$$d2023-09-03$$wger 000995553 9201_ $$0I:(DE-82)123520_20140620$$k123520$$lLehr- und Forschungsgebiet IT-Sicherheit$$x0 000995553 9201_ $$0I:(DE-82)120000_20140620$$k120000$$lFachgruppe Informatik$$x1 000995553 9201_ $$0I:(DE-82)121710_20140620$$k121710$$lLehrstuhl für Kommunikation und verteilte Systeme (Informatik 4)$$x2 000995553 961__ $$c2024-10-22T14:16:12.724586$$x2024-10-22T14:16:12.724586$$z2024-10-23 000995553 980__ $$aI:(DE-82)120000_20140620 000995553 980__ $$aI:(DE-82)121710_20140620 000995553 980__ $$aI:(DE-82)123520_20140620 000995553 980__ $$aUNRESTRICTED 000995553 980__ $$aVDB 000995553 980__ $$aabstract 000995553 980__ $$acontb 000995553 980__ $$acontrib