{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T07:37:26Z","timestamp":1725781046687},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,1,5]]},"DOI":"10.1109\/comsnets51098.2021.9352935","type":"proceedings-article","created":{"date-parts":[[2021,2,19]],"date-time":"2021-02-19T10:11:22Z","timestamp":1613729482000},"page":"1-4","source":"Crossref","is-referenced-by-count":5,"title":["Evading DoH via Live Memory Forensics for Phishing Detection and Content Filtering"],"prefix":"10.1109","author":[{"given":"Gaurav","family":"Varshney","sequence":"first","affiliation":[{"name":"IIT Jammu,J&K,India"}]},{"given":"Padmavathi","family":"Iyer","sequence":"additional","affiliation":[{"name":"SUNY,Albany,New York,USA"}]},{"given":"Pradeep","family":"Atrey","sequence":"additional","affiliation":[{"name":"SUNY,Albany,New York,USA"}]},{"given":"Manoj","family":"Misra","sequence":"additional","affiliation":[{"name":"IIT Roorkee,Uttarakhand,India"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2013.156"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41284-4_2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813720"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IACS.2019.8809179"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-018-0263-4"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IACS.2019.8809084"},{"journal-title":"Memoryze v3 0","year":"2019","key":"ref16"},{"journal-title":"Strings V2 53","year":"2019","key":"ref17"},{"journal-title":"MZHistoryView v1 65","year":"2019","key":"ref18"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2017.8228692"},{"journal-title":"Top 7 DNS Content Filtering for Home to Protect Family and Kids from Cyber Threats kernel description","year":"2020","key":"ref3"},{"journal-title":"Running a DNS over HTTPS client","year":"2020","key":"ref6"},{"journal-title":"DNS Queries over HTTPS (DoH)","year":"2020","key":"ref5"},{"journal-title":"DNS over TLS","year":"2019","key":"ref8"},{"journal-title":"Configure your browser to use DNS over HTTPS","year":"2020","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3427563"},{"journal-title":"DNS-over-HTTPS (DoH) Support in Mozilla Firefox","year":"2020","key":"ref1"},{"journal-title":"DNS over HTTPS","year":"2019","key":"ref9"}],"event":{"name":"2021 International Conference on COMmunication Systems & NETworkS (COMSNETS)","start":{"date-parts":[[2021,1,5]]},"location":"Bangalore, India","end":{"date-parts":[[2021,1,9]]}},"container-title":["2021 International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9352735\/9352808\/09352935.pdf?arnumber=9352935","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,22]],"date-time":"2021-04-22T03:12:19Z","timestamp":1619061139000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9352935\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,5]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/comsnets51098.2021.9352935","relation":{},"subject":[],"published":{"date-parts":[[2021,1,5]]}}}