000999552 001__ 999552 000999552 005__ 20260129064046.0 000999552 0247_ $$2ISBN$$a979-8-3503-6709-6 000999552 0247_ $$2ISBN$$a979-8-3503-6710-2 000999552 0247_ $$2ISBN$$a9798350367096 000999552 0247_ $$2ISBN$$a9798350367102 000999552 0247_ $$2ISSN$$a1712-364X 000999552 0247_ $$2ISSN$$a2574-139X 000999552 0247_ $$2ISSN$$a2643-4202 000999552 0247_ $$2SCOPUS$$aSCOPUS:2-s2.0-85216583097 000999552 0247_ $$2WOS$$aWOS:001415348300026 000999552 0247_ $$2doi$$a10.1109/PST62714.2024.10788074 000999552 037__ $$aRWTH-2024-12179 000999552 041__ $$aEnglish 000999552 1001_ $$0P:(DE-82)IDM03987$$aDrichel, Arthur$$b0$$eCorresponding author$$urwth 000999552 1112_ $$a21. Annual International Conference on Privacy, Security and Trust$$cSydney$$d2024-08-28 - 2024-08-30$$gPST$$wAustralia 000999552 245__ $$aA Comprehensive Study on Multi-Task Learning for Domain Generation Algorithm (DGA) Detection$$honline, print 000999552 260__ $$a[Piscataway, NJ]$$bIEEE$$c2024 000999552 29510 $$a2024 21st Annual International Conference on Privacy, Security and Trust (PST) : 28-30 Aug. 2024 ; conference location: Sydney, Australia / publisher: IEEE 000999552 300__ $$a10 Seiten 000999552 3367_ $$033$$2EndNote$$aConference Paper 000999552 3367_ $$0PUB:(DE-HGF)7$$2PUB:(DE-HGF)$$aContribution to a book$$mcontb 000999552 3367_ $$0PUB:(DE-HGF)8$$2PUB:(DE-HGF)$$aContribution to a conference proceedings$$bcontrib$$mcontrib 000999552 3367_ $$2BibTeX$$aINPROCEEDINGS 000999552 3367_ $$2DRIVER$$aconferenceObject 000999552 3367_ $$2DataCite$$aOutput Types/Conference Paper 000999552 3367_ $$2ORCID$$aCONFERENCE_PAPER 000999552 588__ $$aDataset connected to CrossRef Conference 000999552 591__ $$aGermany 000999552 7001_ $$0P:(DE-82)IDM05900$$aMeyer, Ulrike Michaela$$b1$$eCorresponding author$$urwth 000999552 8564_ $$uhttps://publications.rwth-aachen.de/record/999552/files/999552.pdf$$yRestricted 000999552 909CO $$ooai:publications.rwth-aachen.de:999552$$pVDB 000999552 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)IDM03987$$aRWTH Aachen$$b0$$kRWTH 000999552 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)IDM05900$$aRWTH Aachen$$b1$$kRWTH 000999552 9141_ $$y2024 000999552 9151_ $$0StatID:(DE-HGF)0031$$2StatID$$aPeer reviewed article$$x0 000999552 9201_ $$0I:(DE-82)123520_20140620$$k123520$$lLehr- und Forschungsgebiet IT-Sicherheit$$x0 000999552 9201_ $$0I:(DE-82)120000_20140620$$k120000$$lFachgruppe Informatik$$x1 000999552 961__ $$c2024-12-18T16:30:43.814198$$x2024-12-18T16:30:43.814198$$z2024-12-20 000999552 980__ $$aI:(DE-82)120000_20140620 000999552 980__ $$aI:(DE-82)123520_20140620 000999552 980__ $$aUNRESTRICTED 000999552 980__ $$aVDB 000999552 980__ $$acontb 000999552 980__ $$acontrib