In a DA problem with 15 domains connected by a domain graph (see the figure below), if we use domains 0, 3, 4, 8, 12, 14 as source domains (left of the following figure) and the rest as target domains ...
Here is the code repository for the paper: "Graph-based Malicious Domain Name Detection: How to Use the Heuristic Relations". This paper investigates how to effectively utilize relational patterns ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results