{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:08:20Z","timestamp":1730279300268,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,8]]},"DOI":"10.1109\/iwcmc.2012.6314173","type":"proceedings-article","created":{"date-parts":[[2012,10,9]],"date-time":"2012-10-09T22:07:23Z","timestamp":1349820443000},"page":"30-35","source":"Crossref","is-referenced-by-count":7,"title":["A distributed DNS traffic monitoring system"],"prefix":"10.1109","author":[{"given":"Luca","family":"Deri","sequence":"first","affiliation":[]},{"given":"Lorenzo Luconi","family":"Trombacchi","sequence":"additional","affiliation":[]},{"given":"Maurizio","family":"Martinelli","sequence":"additional","affiliation":[]},{"given":"Daniele","family":"Vannozzi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Verisign to profit from rootserver data?","author":"michlick","year":"2007","journal-title":"Domain Name News Magazine"},{"journal-title":"Building A Monitoring Infrastructure with Nagios","year":"2007","author":"josephsen","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/6294.977771"},{"key":"15","article-title":"Internet diffusion and internet domainsl looking for a new metric: The case of registrations by italian individuals","author":"bonaccorsi","year":"2002","journal-title":"Proc of ICWI Workshop"},{"key":"16","article-title":"Measuring internet diffusion in Italy","author":"martinelli","year":"2002","journal-title":"Proc of IFIP TC6\/ WG6 4 Workshop on Internet Technologies"},{"key":"13","article-title":"Specification of the IP flow information export (IPFIX) protocol for the exchange of ip traffic flow information","volume":"5101","author":"claise","year":"2008","journal-title":"RFC"},{"journal-title":"Wow That's A Lot of Packets","year":"2003","author":"wessels","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1647300.1647302"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1002\/9780470774298"},{"key":"21","article-title":"NProbe: An open source netflow probe for gigabit networks","author":"deri","year":"2003","journal-title":"Proc of Terena TNC Conference"},{"key":"20","article-title":"Distributing authoritative name servers via shared unicast addresses","volume":"3258","author":"hardie","year":"2002","journal-title":"RFC"},{"journal-title":"RRDtool Round Robin Database Tool","year":"0","author":"oetiker","key":"22"},{"key":"23","article-title":"Lightweight key\/value store that goes the extra mile","author":"zawodny","year":"2009","journal-title":"Linux Magazine"},{"key":"24","article-title":"Tsdb: A compressed database for time series","author":"deri","year":"2012","journal-title":"Proc 1st TMA Workshop"},{"key":"25","article-title":"A centralized monitoring infrastructure for improving dns security","author":"antonakakis","year":"2010","journal-title":"Proc 13th RAID Conference"},{"key":"26","article-title":"EXPOSURE: Finding malicious domains using passive DNS analysis","author":"bilge","year":"2011","journal-title":"Proc of 18th NDSS Symposium"},{"key":"27","article-title":"The paternity of an index","volume":"54","author":"hirschman","year":"1964","journal-title":"The American Economic Review"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2006.286248"},{"journal-title":"Google Zeitgeist 2010","year":"2010","key":"3"},{"key":"2","article-title":"Domain names-implementation and specification","volume":"1035","author":"mockapetris","year":"1987","journal-title":"RFC"},{"year":"2010","key":"10"},{"key":"1","article-title":"Domain name system structure and delegation","volume":"1591","author":"postel","year":"1994","journal-title":"RFC"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452547"},{"journal-title":"Launching the DNS War Dot-com Privatization and the Rise of Global Internet Governance","year":"2006","author":"simon","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1179576.1179582"},{"year":"2006","key":"4"},{"key":"9","article-title":"DNS query sent by heavy users and DNS prefetch effect","volume":"51","author":"sato","year":"2009","journal-title":"NANOG"},{"journal-title":"Security Monitoring of DNS Traffic","year":"2006","author":"zdrnja","key":"8"}],"event":{"name":"2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC 2012)","start":{"date-parts":[[2012,8,27]]},"location":"Limassol, Cyprus","end":{"date-parts":[[2012,8,31]]}},"container-title":["2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6299140\/6314161\/06314173.pdf?arnumber=6314173","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T23:01:51Z","timestamp":1490137311000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6314173\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2012.6314173","relation":{},"subject":[],"published":{"date-parts":[[2012,8]]}}}