{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:27:03Z","timestamp":1729618023224,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/lcnw.2015.7365915","type":"proceedings-article","created":{"date-parts":[[2015,12,28]],"date-time":"2015-12-28T16:30:27Z","timestamp":1451320227000},"page":"687-694","source":"Crossref","is-referenced-by-count":4,"title":["Understanding evolution and adoption of Top-level Domain names"],"prefix":"10.1109","author":[{"given":"Thitipong","family":"Jarassriwilai","sequence":"first","affiliation":[]},{"given":"Tiffany","family":"Dauber","sequence":"additional","affiliation":[]},{"given":"Nevil","family":"Brownlee","sequence":"additional","affiliation":[]},{"given":"Aniket","family":"Mahanti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1016\/j.comnet.2011.07.018"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1016\/j.procs.2013.05.012"},{"key":"ref12","first-page":"621","article-title":"Eradicating dns rebinding with the extended same-origin policy","author":"johns","year":"2013","journal-title":"Proceedings of the 22Nd USENIX Conference on Security ser SEC'13"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1145\/1315245.1315298","article-title":"Protecting browsers from dns rebinding attacks","author":"jackson","year":"2007","journal-title":"Proceedings of the 14th ACM Conference on Computer and Communications Security Ser CCS '07"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"2042","DOI":"10.1109\/ICISE.2010.5691281","article-title":"Empirical study on focus technology based on top-level domain","author":"huang","year":"2010","journal-title":"Information Science and Engineering (ICISE) 2010 2nd International Conference on"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/CBMS.2014.148"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/ICT4M.2013.6518933"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/GLOCOM.2001.965864"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/2500098.2500100"},{"key":"ref6","first-page":"540","article-title":"Dns measurements at the. cn tld servers","volume":"7","author":"xuebiao","year":"2009","journal-title":"Fuzzy Systems and Knowledge Discovery 2009 FSKD '09 Sixth International Conference on"},{"key":"ref5","article-title":"DNS Root\/gTLD Performance Measurements","author":"brownlee","year":"2001","journal-title":"Usenix LISA"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TNET.2002.803905"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/1028788.1028792"},{"key":"ref2","article-title":"RFC 1035 Domain Names &#x2013; Implementation and Specification","author":"mockapetris","year":"1987","journal-title":"Internet Engineering Task Force"},{"key":"ref1","article-title":"Domain names &#x2013; concepts and facilities","author":"mockapetris","year":"1987","journal-title":"Internet Engineering Task Force RFC 1034"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/978-3-540-73614-1_8","article-title":"Passive monitoring of dns anomalies","volume":"4579","author":"zdrnja","year":"2007","journal-title":"Detection of Intrusions and Malware and Vulnerability Assessment Ser Lecture Notes in Computer Science"}],"event":{"name":"2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops)","start":{"date-parts":[[2015,10,26]]},"location":"Clearwater Beach, FL","end":{"date-parts":[[2015,10,29]]}},"container-title":["2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7360341\/7365758\/07365915.pdf?arnumber=7365915","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T22:36:25Z","timestamp":1498257385000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7365915\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/lcnw.2015.7365915","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}