{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:14:55Z","timestamp":1761401695830},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/iscc.2013.6755060","type":"proceedings-article","created":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T17:14:57Z","timestamp":1394212497000},"source":"Crossref","is-referenced-by-count":27,"title":["Basic classifiers for DNS tunneling detection"],"prefix":"10.1109","author":[{"given":"Maurizio","family":"Aiello","sequence":"first","affiliation":[]},{"given":"Maurizio","family":"Mongelli","sequence":"additional","affiliation":[]},{"given":"Gianluca","family":"Papaleo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.12.002"},{"key":"16","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-73614-1_9","article-title":"Characterizing dark DNS behavior","author":"oberheide","year":"2007","journal-title":"4th International Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2007)"},{"key":"13","first-page":"1","article-title":"Detection of botnet collusion by degree distribution of domains","author":"burghouwt","year":"2010","journal-title":"5th Internal Conf for Internet Technology and Secured Transactions (ICITST) 2010 L Ondon"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2006.280"},{"key":"11","article-title":"Catching DNS tunnels with at","author":"hind","year":"2009","journal-title":"DefCon 17"},{"key":"12","article-title":"Detecting DNS tunnels using character frequency analysis","author":"born","year":"2010","journal-title":"9th Annual Security Conference"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.11.016"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1093\/jigpal\/jzs029"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.09.010"},{"key":"10","year":"0"},{"key":"7","author":"theodoridis","year":"2009","journal-title":"Pattern Recognition"},{"key":"6","article-title":"Playing with Heyoka: Spoofed tunnels, undetectable data exfiltration and more fun with DNS packets","author":"revelli","year":"2009","journal-title":"Shakacon"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064220"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1163593.1163596"},{"key":"9","year":"0"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-002-0173-7"}],"event":{"name":"2013 IEEE Symposium on Computers and Communications (ISCC)","location":"Split, Croatia","start":{"date-parts":[[2013,7,7]]},"end":{"date-parts":[[2013,7,10]]}},"container-title":["2013 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6746555\/6754912\/06755060.pdf?arnumber=6755060","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T05:15:22Z","timestamp":1498108522000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6755060\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/iscc.2013.6755060","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}