{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T19:40:11Z","timestamp":1746042011976},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/wcins.2010.5541861","type":"proceedings-article","created":{"date-parts":[[2010,8,10]],"date-time":"2010-08-10T11:51:40Z","timestamp":1281441100000},"page":"658-662","source":"Crossref","is-referenced-by-count":4,"title":["Fast-flux attack network identification based on agent lifespan"],"prefix":"10.1109","author":[{"family":"Sheng Yu","sequence":"first","affiliation":[]},{"family":"Shijie Zhou","sequence":"additional","affiliation":[]},{"family":"Sha Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1007\/978-3-540-70542-0_10","article-title":"FluXOR: Detecting and Monitoring Fast-Flux Service Networks","author":"passerini","year":"2008","journal-title":"Lecture Notes in Computer Science"},{"journal-title":"Active Threat Level Analysis System","year":"2009","key":"ref11"},{"journal-title":"FluXOR","year":"2009","key":"ref12"},{"journal-title":"Alexa","year":"2009","key":"ref13"},{"journal-title":"DNS Cache Poisoning","year":"2009","key":"ref14"},{"journal-title":"Content Delivery Network","year":"2010","key":"ref4"},{"journal-title":"Round Robin DNS","year":"2009","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.4.1.75-84"},{"key":"ref5","article-title":"An empirical analysis of the current state of phishing attack and defence","author":"moore","year":"2007","journal-title":"proceedings of the 2007 Workshop on the Economics of Information Security"},{"journal-title":"ICANN Technique Report Initial Report of the GNSO Fast Flux Hosting Working Group","year":"2009","key":"ref8"},{"journal-title":"SSAC advisory on fast flux hosting and DNS","year":"2008","key":"ref7"},{"journal-title":"Know Your Enemy Fast-Flux Service Networks","year":"2007","key":"ref2"},{"journal-title":"Domain Name System","year":"2010","key":"ref1"},{"key":"ref9","article-title":"Measuring and detecting fast-flux service networks","author":"holz","year":"2008","journal-title":"Proceedings of the Symposium on Network and Distributed System Security"}],"event":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS)","start":{"date-parts":[[2010,6,25]]},"location":"Beijing, China","end":{"date-parts":[[2010,6,27]]}},"container-title":["2010 IEEE International Conference on Wireless Communications, Networking and Information Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5524730\/5541718\/05541861.pdf?arnumber=5541861","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T08:22:39Z","timestamp":1497860559000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5541861\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/wcins.2010.5541861","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}