{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:11:37Z","timestamp":1730214697596,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/dsaa.2014.7058071","type":"proceedings-article","created":{"date-parts":[[2015,3,13]],"date-time":"2015-03-13T16:57:30Z","timestamp":1426265850000},"page":"184-190","source":"Crossref","is-referenced-by-count":0,"title":["Detecting hidden propagation structure and its application to analyzing phishing"],"prefix":"10.1109","author":[{"family":"Yang Liu","sequence":"first","affiliation":[]},{"family":"Mingyan Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"The SPAMHAUS project SBL XBL PBL ZEN Lists","year":"0","key":"ref10"},{"journal-title":"UCEPROTECTOR Network","year":"0","key":"ref11"},{"journal-title":"WPBL Weighted Private Block List","year":"0","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2013.6736946"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452543"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1348549.1348552"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498374"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MPOT.2009.933498"},{"key":"ref18","article-title":"Measuring and detecting fast-flux service networks","author":"holz","year":"2008","journal-title":"Proc 15th Ann Network and Distributed System Security Symp (NDSS 08)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455774"},{"journal-title":"HpHosts for Your Pretection","year":"0","key":"ref4"},{"journal-title":"DShield","year":"0","key":"ref3"},{"journal-title":"PhishTank","year":"0","key":"ref6"},{"journal-title":"OpenBloX","year":"0","key":"ref5"},{"journal-title":"SpamCop Blocking List","year":"0","key":"ref8"},{"journal-title":"RIPE Routing Information Service (RIS) Raw Data Project","year":"0","key":"ref7"},{"journal-title":"Composite blocking list","year":"0","key":"ref2"},{"journal-title":"SURBL URL REPUTATION DATA","year":"0","key":"ref9"},{"journal-title":"Barracuda Reputation Blocklist","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394516"},{"key":"ref22","article-title":"Uncovering the temporal dynamics of diffusion networks","author":"rodriguez","year":"2011","journal-title":"arXiv preprint arXiv 1105 0697"},{"journal-title":"Route Views Project","year":"0","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282415"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.2003.1238052"},{"key":"ref26","first-page":"1301","article-title":"Learning triggering kernels for multi-dimensional hawkes processes","volume":"28","author":"zhou","year":"2013","journal-title":"Proceedings of the 30th International Conference on Machine Learning (ICML-13)"},{"key":"ref25","article-title":"Characterization of Blacklists and Tainted Network Traffic","author":"zhang","year":"2013","journal-title":"Proceedings of PAM"}],"event":{"name":"2014 International Conference on Data Science and Advanced Analytics (DSAA)","start":{"date-parts":[[2014,10,30]]},"location":"Shanghai, China","end":{"date-parts":[[2014,11,1]]}},"container-title":["2014 International Conference on Data Science and Advanced Analytics (DSAA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7050498\/7058031\/07058071.pdf?arnumber=7058071","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T14:17:25Z","timestamp":1490365045000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7058071\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/dsaa.2014.7058071","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}