{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,18]],"date-time":"2024-12-18T05:20:15Z","timestamp":1734499215136,"version":"3.30.2"},"reference-count":44,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T00:00:00Z","timestamp":1724803200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T00:00:00Z","timestamp":1724803200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,8,28]]},"DOI":"10.1109\/pst62714.2024.10788042","type":"proceedings-article","created":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T19:15:09Z","timestamp":1734376509000},"page":"1-12","source":"Crossref","is-referenced-by-count":0,"title":["Efficient Data Security Using Predictions of File Availability on the Web"],"prefix":"10.1109","author":[{"given":"Kevin","family":"Saric","sequence":"first","affiliation":[{"name":"QUT,Brisbane,Australia"}]},{"given":"Gowri Sankar","family":"Ramachandran","sequence":"additional","affiliation":[{"name":"QUT,Brisbane,Australia"}]},{"given":"Raja","family":"Jurdak","sequence":"additional","affiliation":[{"name":"QUT,Brisbane,Australia"}]},{"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[{"name":"CSIRO Data61,Brisbane,Australia"}]}],"member":"263","reference":[{"journal-title":"The Digitization of the World from Edge to Core","first-page":"28","author":"Reinsel","key":"ref1"},{"key":"ref2","first-page":"11","article-title":"A survey of strategies for communication networks to protect against large-scale natural disasters","volume-title":"2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM)","author":"Gomes"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1216370.1216373"},{"volume-title":"Web Archive Analytics","author":"V\u00f6lske","key":"ref4"},{"article-title":"Backblaze Drive Stats for Q2 2023","volume-title":"Backblaze Blog - Cloud Storage & Cloud Backup","author":"Klein","key":"ref5"},{"volume-title":"The SSD Edition: 2022 Drive Stats Review. Backblaze Blog - Cloud Storage & Cloud Backup","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1416944.1416947"},{"volume-title":"Silent Data Corruptions at Scale","author":"Dixit","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1126\/science.206.4420.776"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872397"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1109\/TPS-ISA56441.2022.00012","article-title":"A Universal Deduplication Architecture for Secure and Efficient Cloud Storage","volume-title":"Proceedings of the Fourth IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications","author":"Saric"},{"issue":"4","key":"ref12","first-page":"2439","volume":"15","author":"Ghafouri","journal-title":"A Survey on Web Service QoS Prediction Methods"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3369876"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1108\/10662240210422503"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988716"},{"volume-title":"Common Crawl","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/844357.844360"},{"key":"ref18","first-page":"200","article-title":"The Evolution of the Web and Implications for an Incremental Crawler","volume-title":"Proceedings of the 26th International Conference on Very Large Data Bases, ser. VLDB \u201900","author":"Cho"},{"issue":"1","key":"ref19","first-page":"257","volume":"33","author":"Brewington","journal-title":"How dynamic is the Web?"},{"issue":"4,3","volume-title":"Web Crawling, ser. Foundations and Trends in Information Retrieval","author":"Olston","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/958942.958945"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICTER.2017.8257791"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/857166.857170"},{"key":"ref24","first-page":"102261","volume":"153","author":"Avrachenkov","journal-title":"Online algorithms for estimating change rates of web pages"},{"volume-title":"Rate of Change and Other Metrics: A Live Study of the World Wide Web","author":"Douglis","key":"ref25"},{"issue":"04","key":"ref26","first-page":"6046","volume":"34","author":"Upadhyay","journal-title":"Learning to Crawl"},{"volume-title":"Carbon Dating The Web: Estimating the Age of Web Resources","author":"SalahEldeen","key":"ref27","doi-asserted-by":"crossref","DOI":"10.1145\/2487788.2488121"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"volume-title":"Mapping","key":"ref29"},{"volume-title":"Mapping URLs to Filesystem Locations - Apache HTTP Server Version 2.4","key":"ref30"},{"journal-title":"File Recipe Compression in Data Deduplication Systems","first-page":"8","author":"Meister","key":"ref31"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2078861.2078864"},{"issue":"9","key":"ref33","first-page":"767","volume":"17","author":"Griffiths","journal-title":"Optimal Predictions in Everyday Cognition"},{"volume-title":"Algorithms to Live by: The Computer Science of Human Decisions","author":"Christian","key":"ref34"},{"issue":"4","key":"ref35","first-page":"661","volume":"51","author":"Clauset","journal-title":"Power-law distributions in empirical data"},{"issue":"5","key":"ref36","first-page":"323","volume":"46","author":"Newman","journal-title":"Power laws, Pareto distributions and Zipf\u2019s law"},{"key":"ref37","first-page":"127","volume":"3","author":"Tolia","journal-title":"Opportunistic Use of Content Addressable Storage for Distributed File Systems"},{"volume-title":"Which file types do common ransomwares target? - Ransomware Help & Tech Support","key":"ref38"},{"volume-title":"WannaCry Malware Profile. Mandiant","key":"ref39"},{"volume-title":"Bad Rabbit Ransomware","key":"ref40"},{"article-title":"New ransomware, old techniques: Petya adds worm capabilities","volume-title":"Microsoft Security Blog","author":"Security","key":"ref41"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39929-2_4"},{"volume-title":"File-extension-categoriser","author":"Dinneen","key":"ref43"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2016.32"}],"event":{"name":"2024 21st Annual International Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2024,8,28]]},"location":"Sydney, Australia","end":{"date-parts":[[2024,8,30]]}},"container-title":["2024 21st Annual International Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10788036\/10788037\/10788042.pdf?arnumber=10788042","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,17]],"date-time":"2024-12-17T05:51:19Z","timestamp":1734414679000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10788042\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,28]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/pst62714.2024.10788042","relation":{},"subject":[],"published":{"date-parts":[[2024,8,28]]}}}