{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T08:20:49Z","timestamp":1725783649810},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1109\/iscc.2016.7543831","type":"proceedings-article","created":{"date-parts":[[2016,8,18]],"date-time":"2016-08-18T20:35:08Z","timestamp":1471552508000},"page":"778-783","source":"Crossref","is-referenced-by-count":2,"title":["Dealing with temporary domain name issues in the DNS"],"prefix":"10.1109","author":[{"family":"Xuebiao Yuchi","sequence":"first","affiliation":[]},{"family":"Xiaodong Lee","sequence":"additional","affiliation":[]},{"family":"Lanlan Pan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208693"},{"year":"2015","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2184552"},{"journal-title":"Pattern Classification","year":"2000","author":"duda","key":"ref13"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.17487\/rfc1912","article-title":"Common dns operational and configuration errors","author":"barr","year":"1996"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486018"},{"article-title":"DNSSEC Operational Practices, Version 2","year":"0","author":"kolkman","key":"ref16"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1610252.1610269"},{"key":"ref3","article-title":"Redirecting DNS for ads and profit","author":"weaver","year":"2011","journal-title":"Proceedings of USENIX Workshop on Free and Open Communications on the Internet"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1242489.1242499"},{"key":"ref5","article-title":"Drilling down into DNS DDoS data","author":"van nice","year":"2015","journal-title":"OARC 2015 Spring Workshop"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28534-9_1"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879148"},{"key":"ref2","article-title":"DNS prefetching and its privacy implications: when good things go bad","author":"krishnan","year":"2010","journal-title":"Proceedings of USENIX Workshop on LEET"},{"key":"ref1","article-title":"A precise and efficient evaluation of the proximity between web clients and their local dns servers","author":"mao","year":"2002","journal-title":"Proceedings of USENIX General Track"},{"key":"ref9","article-title":"DNS noise: measuring the pervasiveness of temporary domains in modern DNS traffic","author":"chen","year":"2014","journal-title":"Proceedings of IEEE\/IFIP International Conference on Dependable Systems and Networks"}],"event":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","start":{"date-parts":[[2016,6,27]]},"location":"Messina, Italy","end":{"date-parts":[[2016,6,30]]}},"container-title":["2016 IEEE Symposium on Computers and Communication (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7536670\/7543699\/07543831.pdf?arnumber=7543831","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T17:55:43Z","timestamp":1568310943000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7543831\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/iscc.2016.7543831","relation":{},"subject":[],"published":{"date-parts":[[2016,6]]}}}