{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:11:58Z","timestamp":1725541918932},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,7]]},"DOI":"10.1109\/icmlc.2010.5580489","type":"proceedings-article","created":{"date-parts":[[2010,9,22]],"date-time":"2010-09-22T19:57:54Z","timestamp":1285185474000},"page":"2145-2150","source":"Crossref","is-referenced-by-count":0,"title":["Research and implementation of DNSSEC monitoring system"],"prefix":"10.1109","author":[{"given":"Yu","family":"Sun","sequence":"first","affiliation":[]},{"given":"Ru Juan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/501983.501996"},{"key":"ref3","article-title":"Domain Name System Security Extensions","author":"eastlake","year":"1997","journal-title":"RFC2065"},{"key":"ref6","article-title":"Resource Records for the DNS Security Extensions","author":"austein","year":"2005","journal-title":"RFC4034"},{"key":"ref5","article-title":"DNS Security Introduction and Requirements","author":"austein","year":"2005","journal-title":"RFC4033"},{"key":"ref8","article-title":"Threat Analysis of the Domain Name System (DNS)","author":"atkins","year":"2004","journal-title":"RFC3833"},{"key":"ref7","article-title":"Protocol Modifications for the DNS Security Extensions","author":"austein","year":"2005","journal-title":"RFC4035"},{"key":"ref2","article-title":"Domain names:implementation and specification","author":"mockapetris","year":"1987","journal-title":"RFC1035"},{"article-title":"Addressing weaknesses in the Domain Name System protocol","year":"1993","author":"schuba","key":"ref9"},{"key":"ref1","article-title":"Domain names: concepts and facilities","author":"mockapetris","year":"1987","journal-title":"RFC1034"}],"event":{"name":"2010 International Conference on Machine Learning and Cybernetics (ICMLC)","start":{"date-parts":[[2010,7,11]]},"location":"Qingdao, China","end":{"date-parts":[[2010,7,14]]}},"container-title":["2010 International Conference on Machine Learning and Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5570011\/5580479\/05580489.pdf?arnumber=5580489","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T08:35:56Z","timestamp":1490085356000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5580489\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/icmlc.2010.5580489","relation":{},"subject":[],"published":{"date-parts":[[2010,7]]}}}