{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T02:10:07Z","timestamp":1773713407740,"version":"3.50.1"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031562488","type":"print"},{"value":"9783031562495","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-56249-5_9","type":"book-chapter","created":{"date-parts":[[2024,3,19]],"date-time":"2024-03-19T06:51:26Z","timestamp":1710831086000},"page":"206-231","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["WHOIS Right? An\u00a0Analysis of\u00a0WHOIS and\u00a0RDAP Consistency"],"prefix":"10.1007","author":[{"given":"Simon","family":"Fernandez","sequence":"first","affiliation":[]},{"given":"Olivier","family":"Hureau","sequence":"additional","affiliation":[]},{"given":"Andrzej","family":"Duda","sequence":"additional","affiliation":[]},{"given":"Maciej","family":"Korczynski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,20]]},"reference":[{"key":"9_CR1","unstructured":"Affinito, A., et al.: Domain name lifetimes: baseline and threats. In: 6th Network Traffic Measurement and Analysis Conference, TMA 2022. IFIP (2022). https:\/\/dl.ifip.org\/db\/conf\/tma\/tma2022\/tma2022-paper32.pdf"},{"key":"9_CR2","doi-asserted-by":"publisher","unstructured":"Bianzino, A.P., Pezzuolo, D., Mazzini, G.: Who is whois? An analysis of results consistence. In: 2014 22nd International Conference on Software, Telecommunications and Computer Networks (SoftCOM), pp. 289\u2013292. IEEE (2014). https:\/\/doi.org\/10.1109\/SOFTCOM.2014.7039137","DOI":"10.1109\/SOFTCOM.2014.7039137"},{"key":"9_CR3","doi-asserted-by":"publisher","unstructured":"Blanchet, M.: Finding the Authoritative Registration Data Access Protocol (RDAP) Service. Request for Comments RFC 9224, Internet Engineering Task Force (2022). https:\/\/doi.org\/10.17487\/RFC9224","DOI":"10.17487\/RFC9224"},{"issue":"1","key":"9_CR4","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1093\/cybsec\/tyw005","volume":"2","author":"O \u00c7etin","year":"2016","unstructured":"\u00c7etin, O., Hanif Jhaveri, M., Ga\u00f1\u00e1n, C., van Eeten, M., Moore, T.: Understanding the role of sender reputation in abuse reporting and cleanup. J. Cybersecur. 2(1), 83\u201398 (2016). https:\/\/doi.org\/10.1093\/cybsec\/tyw005","journal-title":"J. Cybersecur."},{"key":"9_CR5","doi-asserted-by":"publisher","unstructured":"Christin, N., Yanagihara, S.S., Kamataki, K.: Dissecting one click frauds. In: Proceedings of the 17th ACM Conference on Computer and Communications Security - CCS 2010, p. 15. ACM Press (2010). https:\/\/doi.org\/10.1145\/1866307.1866310","DOI":"10.1145\/1866307.1866310"},{"key":"9_CR6","doi-asserted-by":"publisher","unstructured":"Daigle, L.: WHOIS Protocol Specification. Request for Comments RFC 3912, Internet Engineering Task Force (2004). https:\/\/doi.org\/10.17487\/RFC3912","DOI":"10.17487\/RFC3912"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Dittrich, D., Kenneally, E.: The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research (2012)","DOI":"10.2139\/ssrn.2445102"},{"key":"9_CR8","unstructured":"Du, K., Yang, H., Li, Z.: The ever-changing labyrinth: a large-scale analysis of wildcard DNS powered blackhat SEO. In: USENIX Security 2016, p. 19 (2016)"},{"key":"9_CR9","unstructured":"Felegyhazi, M., Kreibich, C., Paxson, V.: On the potential of proactive domain blacklisting. In: LEET 2010 (2010)"},{"key":"9_CR10","unstructured":"Ganan, C.: WHOIS sunset? A primer in registration data access protocol (RDAP) performance. In: TMA, p. 8 (2021)"},{"issue":"9","key":"9_CR11","doi-asserted-by":"publisher","first-page":"3373","DOI":"10.3390\/s22093373","volume":"22","author":"FA Ghaleb","year":"2022","unstructured":"Ghaleb, F.A., Alsaedi, M., Saeed, F., Ahmad, J., Alasli, M.: Cyber threat intelligence-based malicious URL detection model using ensemble learning. Sensors 22(9), 3373 (2022). https:\/\/doi.org\/10.3390\/s22093373","journal-title":"Sensors"},{"key":"9_CR12","doi-asserted-by":"publisher","unstructured":"Gould, J.: Extensible Provisioning Protocol (EPP) and Registration Data Access Protocol (RDAP) Status Mapping. Request for Comments RFC 8056, Internet Engineering Task Force (2017). https:\/\/doi.org\/10.17487\/RFC8056","DOI":"10.17487\/RFC8056"},{"key":"9_CR13","doi-asserted-by":"publisher","unstructured":"Hao, S., Kantchelian, A., Miller, B., Paxson, V., Feamster, N.: PREDATOR: proactive recognition and elimination of domain abuse at time-of-registration. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1568\u20131579. ACM (2016). https:\/\/doi.org\/10.1145\/2976749.2978317","DOI":"10.1145\/2976749.2978317"},{"key":"9_CR14","doi-asserted-by":"publisher","unstructured":"Hollenbeck, S., Newton, A.: Registration data access protocol (RDAP) object tagging. Request for Comments RFC 8521, Internet Engineering Task Force (2018). https:\/\/doi.org\/10.17487\/RFC8521","DOI":"10.17487\/RFC8521"},{"key":"9_CR15","doi-asserted-by":"publisher","unstructured":"Hollenbeck, S., Newton, A.: JSON Responses for the Registration Data Access Protocol (RDAP). Request for Comments RFC 9083, Internet Engineering Task Force (2021). https:\/\/doi.org\/10.17487\/RFC9083","DOI":"10.17487\/RFC9083"},{"key":"9_CR16","doi-asserted-by":"publisher","unstructured":"Hollenbeck, S., Newton, A.: Registration Data Access Protocol (RDAP) Query Format. Request for Comments RFC 9082, Internet Engineering Task Force (2021). https:\/\/doi.org\/10.17487\/RFC9082","DOI":"10.17487\/RFC9082"},{"key":"9_CR17","unstructured":"IANA: List of TLDS (2023). https:\/\/www.iana.org\/domains\/root\/db"},{"key":"9_CR18","unstructured":"IANA: Registrar IDS (2023). https:\/\/www.iana.org\/assignments\/registrar-ids\/registrar-ids.xhtml"},{"key":"9_CR19","unstructured":"ICANN: ICANN registrar agreement. https:\/\/www.icann.org\/resources\/pages\/registrars-0d-2012-02-25-en"},{"key":"9_CR20","unstructured":"ICANN: ICANN temporary agreement for GTLDS to comply with GDPR. https:\/\/www.icann.org\/resources\/pages\/gtld-registration-data-specs-en"},{"key":"9_CR21","unstructured":"ICANN: ICANN whois history. https:\/\/whois.icann.org\/en\/history-whois"},{"key":"9_CR22","doi-asserted-by":"publisher","unstructured":"IETF: Domain names - implementation and specification. Request for Comments RFC 1035, Internet Engineering Task Force (1987). https:\/\/doi.org\/10.17487\/RFC1035","DOI":"10.17487\/RFC1035"},{"key":"9_CR23","doi-asserted-by":"publisher","unstructured":"Izhikevich, L., et al.: ZDNS: a fast DNS toolkit for internet measurement. In: Proceedings of the 22nd ACM Internet Measurement Conference, pp. 33\u201343. ACM (2022). https:\/\/doi.org\/10.1145\/3517745.3561434","DOI":"10.1145\/3517745.3561434"},{"key":"9_CR24","doi-asserted-by":"publisher","unstructured":"Kitterman, S.: Sender Policy Framework (SPF) for Authorizing Use of Domains in Email, Version 1. Request for Comments RFC 7208, Internet Engineering Task Force (2014). https:\/\/doi.org\/10.17487\/RFC7208","DOI":"10.17487\/RFC7208"},{"key":"9_CR25","doi-asserted-by":"publisher","unstructured":"Lauinger, T., Onarlioglu, K., Chaabane, A., Robertson, W., Kirda, E.: WHOIS lost in translation: (mis)understanding domain name expiration and re-registration. In: Proceedings of the 2016 Internet Measurement Conference, pp. 247\u2013253. ACM (2016). https:\/\/doi.org\/10.1145\/2987443.2987463","DOI":"10.1145\/2987443.2987463"},{"key":"9_CR26","doi-asserted-by":"publisher","unstructured":"Le Pochat, V., et al.: A practical approach for taking down avalanche botnets under real-world constraints. In: Proceedings 2020 Network and Distributed System Security Symposium. Internet Society (2020). https:\/\/doi.org\/10.14722\/ndss.2020.24161","DOI":"10.14722\/ndss.2020.24161"},{"key":"9_CR27","doi-asserted-by":"publisher","unstructured":"Liu, S., Foster, I., Savage, S., Voelker, G.M., Saul, L.K.: Who is.com?: learning to parse WHOIS records. In: Proceedings of the 2015 Internet Measurement Conference, pp. 369\u2013380. ACM (2015). https:\/\/doi.org\/10.1145\/2815675.2815693","DOI":"10.1145\/2815675.2815693"},{"key":"9_CR28","doi-asserted-by":"publisher","unstructured":"Loffredo, M., Martinelli, M.: Registration Data Access Protocol (RDAP) Partial Response. Request for Comments RFC 8982, Internet Engineering Task Force (2021). https:\/\/doi.org\/10.17487\/RFC8982","DOI":"10.17487\/RFC8982"},{"key":"9_CR29","doi-asserted-by":"publisher","unstructured":"Lu, C., et al.: From WHOIS to WHOWAS: a large-scale measurement study of domain registration privacy under the GDPR. In: Proceedings 2021 Network and Distributed System Security Symposium. Internet Society, Virtual (2021). https:\/\/doi.org\/10.14722\/ndss.2021.23134","DOI":"10.14722\/ndss.2021.23134"},{"key":"9_CR30","doi-asserted-by":"publisher","unstructured":"Maass, M., et al.: Effective notification campaigns on the web: a matter of trust, framing, and support. In: USENIX Security 2021 (2021). https:\/\/doi.org\/10.48550\/ARXIV.2011.06260","DOI":"10.48550\/ARXIV.2011.06260"},{"key":"9_CR31","doi-asserted-by":"publisher","unstructured":"McCallum, A., Li, W.: Early results for named entity recognition with conditional random fields, feature induction and web-enhanced lexicons. In: Proceedings of the Seventh Conference on Natural Language Learning at HLT-NAACL 2003, Edmonton, Canada, vol. 4, pp. 188\u2013191. Association for Computational Linguistics (2003). https:\/\/doi.org\/10.3115\/1119176.1119206","DOI":"10.3115\/1119176.1119206"},{"key":"9_CR32","doi-asserted-by":"publisher","unstructured":"Mockapetris: Domain names - concepts and facilities. Request for Comments RFC 1034, Internet Engineering Task Force (1987). https:\/\/doi.org\/10.17487\/RFC1034","DOI":"10.17487\/RFC1034"},{"key":"9_CR33","doi-asserted-by":"publisher","unstructured":"Newton, A., Hollenbeck, S.: Registration Data Access Protocol (RDAP) Query Format. Request for Comments RFC 7482, Internet Engineering Task Force (2015). https:\/\/doi.org\/10.17487\/RFC7482","DOI":"10.17487\/RFC7482"},{"key":"9_CR34","doi-asserted-by":"publisher","unstructured":"Newton, A., Hollenbeck, S.: JSON Responses for the Registration Data Access Protocol (RDAP). Request for Comments RFC 7483, Internet Engineering Task Force (2015). https:\/\/doi.org\/10.17487\/RFC7483","DOI":"10.17487\/RFC7483"},{"issue":"10","key":"9_CR35","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1145\/2896816","volume":"59","author":"C Partridge","year":"2016","unstructured":"Partridge, C., Allman, M.: Ethical considerations in network measurement papers. Commun. ACM 59(10), 58\u201364 (2016)","journal-title":"Commun. ACM"},{"key":"9_CR36","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-030-44081-7_11","volume-title":"Passive and Active Measurement","author":"R Sommese","year":"2020","unstructured":"Sommese, R., et al.: When parents and children disagree: diving into DNS delegation inconsistency. In: Sperotto, A., Dainotti, A., Stiller, B. (eds.) PAM 2020. LNCS, vol. 12048, pp. 175\u2013189. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-44081-7_11"},{"key":"9_CR37","unstructured":"European Union: General data protection regulation. https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj"},{"key":"9_CR38","doi-asserted-by":"publisher","unstructured":"Vissers, T., Joosen, W., Nikiforakis, N.: Parking sensors: analyzing and detecting parked domains. In: Proceedings 2015 Network and Distributed System Security Symposium. Internet Society (2015). https:\/\/doi.org\/10.14722\/ndss.2015.23053","DOI":"10.14722\/ndss.2015.23053"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-56249-5_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,19]],"date-time":"2024-03-19T06:55:10Z","timestamp":1710831310000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-56249-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031562488","9783031562495"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-56249-5_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"20 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Passive and Active Network Measurement","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 March 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 March 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pam2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/pam2024.cs.northwestern.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"64","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.9","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.42","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}