In a DA problem with 15 domains connected by a domain graph (see the figure below), if we use domains 0, 3, 4, 8, 12, 14 as source domains (left of the following figure) and the rest as target domains ...
Here is the code repository for the paper: "Graph-based Malicious Domain Name Detection: How to Use the Heuristic Relations". This paper investigates how to effectively utilize relational patterns ...