{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T11:10:43Z","timestamp":1730200243880,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/bigdata.2018.8622074","type":"proceedings-article","created":{"date-parts":[[2019,1,25]],"date-time":"2019-01-25T03:07:18Z","timestamp":1548385638000},"page":"5049-5057","source":"Crossref","is-referenced-by-count":3,"title":["AIL - The design and implementation of an Analysis Information Leak framework"],"prefix":"10.1109","author":[{"given":"Sami","family":"Mokaddem","sequence":"first","affiliation":[]},{"given":"Gerard","family":"Wagener","sequence":"additional","affiliation":[]},{"given":"Alexandre","family":"Dulaunoy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"CIRCL - Computer Incident Response Center Luxembourg Tr-46 -information leaks affecting luxembourg and recommendations","year":"0","key":"ref33"},{"journal-title":"Codepad","year":"0","key":"ref32"},{"journal-title":"Github Gist","year":"0","key":"ref31"},{"journal-title":"Newspaper3k Article scraping & curation","year":"0","key":"ref30"},{"key":"ref10","first-page":"133","article-title":"Hackers gone wild: the 2011 spring break of lulzsec","volume":"13","author":"pendergrass","year":"2012","journal-title":"Issues in Information Systems"},{"key":"ref11","article-title":"The risks posed by jihadist hackers","volume":"6","author":"christopher","year":"2013","journal-title":"CTC Sentinel"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SysSec.2011.25"},{"journal-title":"New dridex infection vector identified","year":"0","author":"rascagnres","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/S0262-4079(17)32245-5"},{"journal-title":"Pastehunter","year":"0","key":"ref15"},{"journal-title":"Circ","year":"0","key":"ref16"},{"key":"ref17","first-page":"49","article-title":"Misp: The design and implementation of a collaborative threat intelligence sharing platform","author":"wagner","year":"0","journal-title":"Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security ser WISCS &#x2019;16"},{"journal-title":"Machine Tags","year":"0","key":"ref18"},{"journal-title":"Whoosh","year":"0","key":"ref19"},{"journal-title":"Request tracker for incident response","year":"0","key":"ref28"},{"key":"ref4","article-title":"Peering into the muddy waters of pastebin","volume":"2012","author":"matic","year":"2012","journal-title":"ERCIM News"},{"journal-title":"ssdeep - fuzzy hashing program","year":"0","author":"kornblum","key":"ref27"},{"journal-title":"PASTEBIN","year":"0","key":"ref3"},{"journal-title":"Have I Been Pwned?","year":"0","key":"ref6"},{"journal-title":"Splash - a javascript rendering service","year":"0","key":"ref29"},{"key":"ref5","first-page":"49","article-title":"Collaborative coding interfaces on the web","author":"jakub","year":"2016","journal-title":"International Conference of Live Interfaces"},{"key":"ref8","article-title":"Doxing: Dangers and defenses","author":"moyer","year":"2016","journal-title":"Master&#x2019;s thesis"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23585-1_8"},{"key":"ref2","article-title":"The void - an interesting place fo an interesting place for network security monitoring","author":"dulaunoy","year":"2014","journal-title":"Proceedings of 30th TERENA Networking Conference (TNC)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-016-9406-0"},{"key":"ref1","first-page":"1129","article-title":"Data leak prevention through named entity recognition","author":"hidalgo","year":"2010","journal-title":"SocialCom\/PASSAT IEEE Computer Society"},{"journal-title":"Thehive","year":"0","key":"ref20"},{"journal-title":"ZeroMQ","year":"2013","author":"akgul","key":"ref22"},{"journal-title":"Protocol Specifications","year":"0","key":"ref21"},{"journal-title":"How fast is Redis?","year":"0","key":"ref24"},{"journal-title":"Flask","year":"0","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CTC.2013.9"},{"key":"ref25","first-page":"707","article-title":"Binary codes capable of correcting deletions, insertions, and reversals","volume":"10","author":"levenshtein","year":"1966","journal-title":"Soviet Physics Doklady"}],"event":{"name":"2018 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2018,12,10]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2018,12,13]]}},"container-title":["2018 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8610059\/8621858\/08622074.pdf?arnumber=8622074","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T00:23:18Z","timestamp":1643242998000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8622074\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2018.8622074","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}