{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T10:16:21Z","timestamp":1742638581295},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1109\/lanman.2016.7548854","type":"proceedings-article","created":{"date-parts":[[2016,8,25]],"date-time":"2016-08-25T16:59:06Z","timestamp":1472144346000},"page":"1-6","source":"Crossref","is-referenced-by-count":5,"title":["Name anomaly detection for ICN"],"prefix":"10.1109","author":[{"given":"Daishi","family":"Kondo","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Silverston","sequence":"additional","affiliation":[]},{"given":"Hideki","family":"Tode","sequence":"additional","affiliation":[]},{"given":"Tohru","family":"Asami","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Perrin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"NDN Packet Format Specification","year":"0","key":"ref10"},{"journal-title":"RFC 3986","year":"0","key":"ref11"},{"journal-title":"Alexa Top 500 Global Sites","year":"0","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19460-3"},{"journal-title":"Frequency Analysis","year":"0","key":"ref14"},{"journal-title":"15 SEO Best Practices for Structuring URLs","year":"0","key":"ref15"},{"key":"ref16","first-page":"478","article-title":"A semantic firewall for Content-Centric Networking","author":"goergen","year":"2013","journal-title":"2013 IFIP\/IEEE International Symposium on Integrated Network Management (IM 2013) IM"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282402"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2018584.2018586"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2012.6193505"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2491717"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656887"},{"year":"0","key":"ref6","article-title":"System Design Guide for Thwarting Targeted Email Attacks"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787482"},{"journal-title":"We knew the web was big&#x2026; (Google Official Blog)","year":"0","key":"ref8"},{"journal-title":"RFC 1808","year":"0","key":"ref7"},{"journal-title":"Understanding Targeted Attacks The Impact of Targeted Attacks","year":"0","key":"ref2"},{"journal-title":"IT Security Risks Survey 2014 A Business Approach to Managing Data Security Threats","year":"0","key":"ref1"},{"journal-title":"CCNx 1 0 Protocol Architecture","year":"0","key":"ref9"}],"event":{"name":"2016 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN)","start":{"date-parts":[[2016,6,13]]},"location":"Rome, Italy","end":{"date-parts":[[2016,6,15]]}},"container-title":["2016 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7541907\/7548833\/07548854.pdf?arnumber=7548854","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,27]],"date-time":"2016-09-27T13:35:41Z","timestamp":1474983341000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7548854\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/lanman.2016.7548854","relation":{},"subject":[],"published":{"date-parts":[[2016,6]]}}}