{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:54:09Z","timestamp":1764784449528,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1109\/dessert50317.2020.9125012","type":"proceedings-article","created":{"date-parts":[[2020,6,25]],"date-time":"2020-06-25T20:46:07Z","timestamp":1593117967000},"page":"102-109","source":"Crossref","is-referenced-by-count":6,"title":["Predicting malicious hosts by blacklisted IPv4 address density estimation"],"prefix":"10.1109","author":[{"given":"Dmytro","family":"Likhomanov","sequence":"first","affiliation":[]},{"given":"Vladyslav","family":"Poliukh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2009.113"},{"key":"ref11","first-page":"925","article-title":"Handbook of mathematical functions: with formulas, graphs, and mathematical tables","author":"abramowitz","year":"1972","journal-title":"Dover Books on Mathematics"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2307\/2346830"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177704472"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-21606-5"},{"key":"ref15","first-page":"827","article-title":"Mixture models","author":"seidel","year":"2010","journal-title":"International Encyclopedia of Statistical Science"},{"journal-title":"Handbook of the Normal Distribution","year":"1982","author":"patel","key":"ref16"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1214\/cbms\/1462106013","article-title":"Mixture models: theory, geometry and applications. NSF-CBMS","author":"lindsay","year":"1995","journal-title":"Regional Conference Series in Probability and Statistics"},{"key":"ref18","article-title":"Information theory and an extension of the maximum likelihood principle","author":"akaike","year":"1973","journal-title":"2nd Int Symp on Information Theory"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT.2012.14"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2018.8587342"},{"key":"ref5","first-page":"41","article-title":"A classification method of unknown malicious websites using address features of each network address Class","volume":"10","author":"kanazawa","year":"2018","journal-title":"International Journal of Informatics Society"},{"year":"2019","key":"ref8","article-title":"Blocking hosts"},{"year":"2019","key":"ref7","article-title":"Talos intelligence threat feed"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3140368.3140369"},{"year":"2019","key":"ref1","article-title":"Symantec&#x2019;s Annual Threat Report Reveals More Ambitious and Destructive Attacks"},{"year":"2019","key":"ref9","article-title":"Alexa top 1 million sites"}],"event":{"name":"2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT)","start":{"date-parts":[[2020,5,14]]},"location":"Kyiv, Ukraine","end":{"date-parts":[[2020,5,18]]}},"container-title":["2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9122248\/9124995\/09125012.pdf?arnumber=9125012","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:55:18Z","timestamp":1656345318000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9125012\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/dessert50317.2020.9125012","relation":{},"subject":[],"published":{"date-parts":[[2020,5]]}}}