{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T05:31:02Z","timestamp":1725773462008},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642300448"},{"type":"electronic","value":"9783642300455"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30045-5_28","type":"book-chapter","created":{"date-parts":[[2012,5,15]],"date-time":"2012-05-15T04:33:29Z","timestamp":1337056409000},"page":"370-384","source":"Crossref","is-referenced-by-count":7,"title":["Semantic Exploration of DNS"],"prefix":"10.1007","author":[{"given":"Samuel","family":"Marchal","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"J\u00e9r\u00f4me","family":"Fran\u00e7ois","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Cynthia","family":"Wagner","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Thomas","family":"Engel","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"28_CR1","unstructured":"Backtrack linux - penetration testing distribution (accessed on 08\/22\/11), \n                    \n                      www.backtrack-linux.org"},{"key":"28_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-642-15512-3_2","volume-title":"Recent Advances in Intrusion Detection","author":"M. Antonakakis","year":"2010","unstructured":"Antonakakis, M., Dagon, D., Luo, X., Perdisci, R., Lee, W., Bellmor, J.: A Centralized Monitoring Infrastructure for Improving DNS Security. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol.\u00a06307, pp. 18\u201337. Springer, Heidelberg (2010)"},{"key":"28_CR3","unstructured":"Bilge, L., Kirda, E., Kruegel, C., Balduzzi, M.: Exposure: Finding malicious domains using passive dns analysis. In: Network and Distributed System Security Symposium, NDSS (2011)"},{"key":"28_CR4","doi-asserted-by":"crossref","unstructured":"Budanitsky, A., Hirst, G.: Evaluating wordnet-based measures of lexical semantic relatedness. Comput. Linguist. 32 (March 2006)","DOI":"10.1162\/coli.2006.32.1.13"},{"key":"28_CR5","doi-asserted-by":"publisher","first-page":"1561","DOI":"10.1002\/spe.885","volume":"38","author":"H. Crawford","year":"2008","unstructured":"Crawford, H., Aycock, J.: Kwyjibo: automatic domain name generation. Software Practice and Experience\u00a038, 1561\u20131567 (2008)","journal-title":"Software Practice and Experience"},{"key":"28_CR6","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/CATCH.2009.48","volume-title":"Proceedings of the 2009 Cybersecurity Applications & Technology Conference for Homeland Security","author":"D. Dagon","year":"2009","unstructured":"Dagon, D., Lee, W.: Global internet monitoring using passive dns. In: Proceedings of the 2009 Cybersecurity Applications & Technology Conference for Homeland Security, pp. 163\u2013168. IEEE Computer Society, Washington, DC (2009)"},{"key":"28_CR7","unstructured":"Faltstrom, P., Hoffman, P., Costello, A.: Internationalizing Domain Names in Applications (IDNA). RFC 3490 (Proposed Standard) (March 2003), \n                    \n                      http:\/\/www.ietf.org\/rfc\/rfc3490.txt\n                    \n                    \n                  , obsoleted by RFCs 5890, 5891"},{"key":"28_CR8","unstructured":"Hao, S., Feamster, N., Pandrangi, R.: An internet wide view into DNS lookup patterns. Tech. rep., School of Computer Science, Georgia Tech (June 2010)"},{"key":"28_CR9","doi-asserted-by":"crossref","unstructured":"Hindle, D.: Noun classification from predicate-argument structures. In: 28th Annual Meeting on Association for Computational Linguistics, ACL. Association for Computational Linguistics (1990)","DOI":"10.3115\/981823.981857"},{"key":"28_CR10","unstructured":"Kamra, A., Feng, H., Misra, V., Keromytis, A.: The effect of dns delays on worm propagation in an ipv6 internet. In: Proceedings of IEEE Infocom. IEEE, Miami (2005)"},{"key":"28_CR11","unstructured":"Kilgarriff, A.: Thesauruses for natural language processing. In: Natural Language Processing and Knowledge Engineering (October 2003)"},{"key":"28_CR12","unstructured":"Kolb, P.: Experiments on the difference between semantic similarity and relatedness. In: 17th Nordic Conference of Computational Linguistics NODALIDA. Northern European Association for Language Technology (2009)"},{"key":"28_CR13","doi-asserted-by":"crossref","unstructured":"Lin, D.: Automatic retrieval and clustering of similar words. In: 17th International Conference on Computational Linguistics - COLING. Association for Computational Linguistics (1998)","DOI":"10.3115\/980432.980696"},{"key":"28_CR14","volume-title":"Foundations of Statistical Natural Language Processing","author":"C.D. Manning","year":"1999","unstructured":"Manning, C.D., Sch\u00fctze, H.: Foundations of Statistical Natural Language Processing. MIT Press, Cambridge (1999)"},{"key":"28_CR15","unstructured":"Mockapetris, P.: Rfc 1035: Domain names - implementation and specification"},{"key":"28_CR16","doi-asserted-by":"crossref","unstructured":"Mockapetris, P.: Rfc 1034: Domain names - concepts and facilities (1987)","DOI":"10.17487\/rfc1034"},{"key":"28_CR17","first-page":"123","volume-title":"Proceedings of the 1988 ACM SIGCOMM","author":"P. Mockapetris","year":"1988","unstructured":"Mockapetris, P., Dunlap, K.: Development of the domain name system. In: Proceedings of the 1988 ACM SIGCOMM, pp. 123\u2013133. IEEE Computer Society, Stanford (1988)"},{"key":"28_CR18","doi-asserted-by":"crossref","unstructured":"Perdisci, R., Corona, I., Dagon, D., Lee, W.: Detecting malicious flux service networks through passive analysis of recursive dns traces. In: Proceedings of ACSAC 2009, pp. 311\u2013320 (2009)","DOI":"10.1109\/ACSAC.2009.36"},{"key":"28_CR19","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1145\/1452520.1452547","volume-title":"Proceedings of the 8th ACM SIGCOMM Conference on Internet Measurement, IMC 2008","author":"D. Plonka","year":"2008","unstructured":"Plonka, D., Barford, P.: Context-aware clustering of dns query traffic. In: Proceedings of the 8th ACM SIGCOMM Conference on Internet Measurement, IMC 2008, pp. 217\u2013230. ACM, New York (2008)"},{"key":"28_CR20","unstructured":"Segaran, T., Hammerbacher, J.: Beautiful Data: The Stories Behind Elegant Data Solutions, ch. 14. O\u2019Reilly Media (2009), \n                    \n                      http:\/\/norvig.com\/ngrams\/"},{"key":"28_CR21","doi-asserted-by":"crossref","unstructured":"Wagner, C., Fran\u00e7ois, J., State, R., Engel, T., Dulaunoy, A., Wagener, G.: Sdbf: Smart dns brute-forcer. In: To Appear in IEEE\/IFIP Network Operations and Management Symposium - NOMS, Miniconference. IEEE Computer Society (2012)","DOI":"10.1109\/NOMS.2012.6212021"},{"key":"28_CR22","unstructured":"Weimer, F.: Passive DNS replication. In: Conference on Computer Security Incident Handling (2005)"},{"key":"28_CR23","unstructured":"Weir, M., Aggarwal, S., Medeiros, B.D., Glodek, B.: Password cracking using probabilistic context-free grammars. In: Symposium on Security and Privacy. IEEE"},{"key":"28_CR24","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/1879141.1879148","volume-title":"Proceedings of the 10th Annual Conference on Internet Measurement, IMC 2010","author":"S. Yadav","year":"2010","unstructured":"Yadav, S., Reddy, A.K.K., Reddy, A.N., Ranjan, S.: Detecting algorithmically generated malicious domain names. In: Proceedings of the 10th Annual Conference on Internet Measurement, IMC 2010, pp. 48\u201361. ACM, New York (2010)"}],"container-title":["Lecture Notes in Computer Science","NETWORKING 2012"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30045-5_28.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:25:49Z","timestamp":1620127549000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30045-5_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642300448","9783642300455"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30045-5_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}