{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T10:02:51Z","timestamp":1729677771354,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/mipro.2014.6859782","type":"proceedings-article","created":{"date-parts":[[2014,7,30]],"date-time":"2014-07-30T12:19:16Z","timestamp":1406722756000},"page":"1376-1380","source":"Crossref","is-referenced-by-count":6,"title":["CROFlux &amp;#x2014; Passive DNS method for detecting fast-flux domains"],"prefix":"10.1109","author":[{"given":"Toni","family":"Grzinic","sequence":"first","affiliation":[]},{"given":"Darko","family":"Perhoc","sequence":"additional","affiliation":[]},{"given":"Marko","family":"Maric","sequence":"additional","affiliation":[]},{"given":"Filip","family":"Vlasic","sequence":"additional","affiliation":[]},{"given":"Tibor","family":"Kulcsar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Arbor Atlas","year":"0","key":"17"},{"journal-title":"Feodo Tracker","year":"0","key":"15"},{"year":"0","key":"16"},{"journal-title":"Palevo Tracker","year":"0","key":"13"},{"year":"0","key":"14"},{"journal-title":"Zeus Tracker","year":"0","key":"11"},{"journal-title":"SpyEye Tracker","year":"0","key":"12"},{"key":"3","article-title":"Freiling Detection and mitigation of fast-flux service networks","author":"holz","year":"2008","journal-title":"Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS'08)"},{"key":"2","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/978-3-540-73614-1_8","author":"zdrnja","year":"2007","journal-title":"Passive Monitoring of Dns Anomalies Detection of Intrusions and Malware and Vulnerability Assessment"},{"key":"1","article-title":"Passive DNS replication","author":"weimer","year":"2005","journal-title":"FIRST Conference on Computer Security Incident"},{"journal-title":"ISC Passive DNS Architecture Internet Systems Consortium","year":"2012","author":"edmonds","key":"10"},{"year":"0","key":"7"},{"key":"6","first-page":"714","article-title":"Early detection of malicious flux networks via large-scale passive dns traffic analysis, dependable and secure computing","volume":"9","author":"perdisci","year":"2012","journal-title":"IEEE Transactions on"},{"journal-title":"EXPOSURE Finding Malicious Domains Using Passive DNS Analysis NDSS","year":"2011","author":"bilge","key":"5"},{"key":"4","article-title":"Detection of fast flux botnets","author":"patrycja","year":"2009","journal-title":"21th CENTR Technical Workshop"},{"year":"0","key":"9"},{"key":"8","article-title":"New trends in fastflux networks","author":"wei xinran wang","year":"2013","journal-title":"Black Hat USA"}],"event":{"name":"2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","start":{"date-parts":[[2014,5,26]]},"location":"Opatija, Croatia","end":{"date-parts":[[2014,5,30]]}},"container-title":["2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6849597\/6859515\/06859782.pdf?arnumber=6859782","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T13:35:53Z","timestamp":1498138553000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6859782\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/mipro.2014.6859782","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}