{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:18:57Z","timestamp":1761401937331,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/bigdata.2017.8258415","type":"proceedings-article","created":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T22:47:28Z","timestamp":1516056448000},"page":"4010-4015","source":"Crossref","is-referenced-by-count":11,"title":["Automatic detection of DNS manipulations"],"prefix":"10.1109","author":[{"given":"Martino","family":"Trevisan","sequence":"first","affiliation":[]},{"given":"Idilio","family":"Drago","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Mellia","sequence":"additional","affiliation":[]},{"given":"Maurizio M.","family":"Munafo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"195","article-title":"Satellite: Joint Analysis of CDNs and Network-Level Interference","author":"scott","year":"2016","journal-title":"Proc of the USENIX Annual Technical Conference"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/IWCMC.2016.7577030"},{"key":"ref12","article-title":"Implications of Netalyzr's DNS Measurements","author":"weaver","year":"2011","journal-title":"Proc of the 1st Workshop on Securing and Trusting Internet Names"},{"key":"ref13","article-title":"Infiight Modifications of Content: Who Are the Culprits?","author":"zhang","year":"2011","journal-title":"Proc of the 4th LEET"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/2815675.2815683"},{"key":"ref3","article-title":"Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority","author":"dagon","year":"2008","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref6","first-page":"573","article-title":"Measuring the practical impact of dnssec deployment","author":"lian","year":"2013","journal-title":"Proceedings of the 22nd USENIX Conference on Security SEC'13"},{"key":"ref5","first-page":"20","article-title":"Informal identification of outliers in medical data","volume":"1","author":"laurikkala","year":"2000","journal-title":"Fifth International Workshop on Intelligent Data Analysis in Medicine and Pharmacology"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/2987443.2987482"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TIFS.2014.2357251"},{"key":"ref2","article-title":"Building a Dynamic Reputation System for DN S","author":"antonakakis","year":"2010","journal-title":"19th USENIX Security Symposium"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1007\/978-3-642-15512-3_2"},{"key":"ref9","article-title":"Global Measurement of DNS Manipulation","author":"pearce","year":"2017","journal-title":"Proceedings of the 26th USENIX Security Symposium"}],"event":{"name":"2017 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2017,12,11]]},"location":"Boston, MA","end":{"date-parts":[[2017,12,14]]}},"container-title":["2017 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8241556\/8257893\/08258415.pdf?arnumber=8258415","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,19]],"date-time":"2018-02-19T23:58:38Z","timestamp":1519084718000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8258415\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2017.8258415","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}