{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T00:54:34Z","timestamp":1746320074851},"publisher-location":"Wiesbaden","reference-count":7,"publisher":"Vieweg+Teubner","isbn-type":[{"type":"print","value":"9783834806604"},{"type":"electronic","value":"9783834892836"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-8348-9283-6_17","type":"book-chapter","created":{"date-parts":[[2009,3,6]],"date-time":"2009-03-06T16:17:39Z","timestamp":1236356259000},"page":"163-171","source":"Crossref","is-referenced-by-count":9,"title":["Empirical research of IP blacklists"],"prefix":"10.1007","author":[{"given":"Christian J.","family":"Dietrich","sequence":"first","affiliation":[]},{"given":"Christian","family":"Rossow","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"C. Rossow (2007): Anti-spam measure of European ISPs\/ESPs. http:\/\/www.internet-sicherheit.de\/fileadmin\/docs\/publikationen\/anti-spam-measures-of-european-isps-esps.pdf"},{"key":"17_CR2","unstructured":"Spamhaus (2008): Effective Spam Filtering. http:\/\/www.spamhaus.org\/effective_filtering.html"},{"key":"17_CR3","unstructured":"P. Manzano, C. Rossow (2007): Provider Security Measures. Deliverable 2.1.6 of ENISA\u2019s Work Programme 2007. http:\/\/www.enisa.europa.eu\/pages\/spam\/doc\/enisa_spam_study_2007.pdf"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"A. Ramachandran, N. Feamster (2006): Understanding the network-level behavior of spammers. http:\/\/www.cc.gatech.edu\/~feamster\/papers\/p396-ramachandran.pdf","DOI":"10.1145\/1159913.1159947"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"A. Ramachandran, N. Feamster, S. Vempala (2007): Filtering spam with behavioral blacklisting. http:\/\/www.cc.gatech.edu\/~feamster\/papers\/bb-ccs2007.pdf","DOI":"10.1145\/1315245.1315288"},{"key":"17_CR6","unstructured":"A. Ramachandran, N. Feamster, D. Dagon (2006): Revealing botnet membership using DNSBL counter-intelligence. http:\/\/www.cc.gatech.edu\/~feamster\/publications\/dnsbl.pdf"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"J. Jung, E. Sit (2004): An empirical study of spam traffic and the use of DNS black lists, http:\/\/www.imconf.net\/imc-2004\/papers\/p370-jung.pdf","DOI":"10.1145\/1028788.1028838"}],"container-title":["ISSE 2008 Securing Electronic Business Processes"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-8348-9283-6_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T12:22:45Z","timestamp":1606134165000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-8348-9283-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783834806604","9783834892836"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-8348-9283-6_17","relation":{},"subject":[]}}