{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:25:52Z","timestamp":1765887952918,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T00:00:00Z","timestamp":1512345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,4]]},"DOI":"10.1145\/3134600.3134637","type":"proceedings-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T19:18:32Z","timestamp":1512415112000},"page":"449-460","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Lean On Me"],"prefix":"10.1145","author":[{"given":"Matteo","family":"Dell'Amico","sequence":"first","affiliation":[{"name":"Symantec Research Labs"}]},{"given":"Leyla","family":"Bilge","sequence":"additional","affiliation":[{"name":"Symantec Research Labs"}]},{"given":"Ashwin","family":"Kayyoor","sequence":"additional","affiliation":[{"name":"Symantec Research Labs"}]},{"given":"Petros","family":"Efstathopoulos","sequence":"additional","affiliation":[{"name":"Symantec Research Labs"}]},{"given":"Pierre-Antoine","family":"Vervier","sequence":"additional","affiliation":[{"name":"Symantec Research Labs"}]}],"member":"320","published-online":{"date-parts":[[2017,12,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Stronger, Scarier. Symantec Official Blog. (April","author":"Abramson Joshua","year":"2016","unstructured":"Joshua Abramson . 2016. DDoS Attacks: Bigger , Stronger, Scarier. Symantec Official Blog. (April 2016 ). Retrieved June 1, 2017 from https:\/\/goo.gl\/NZDRsD Joshua Abramson. 2016. DDoS Attacks: Bigger, Stronger, Scarier. Symantec Official Blog. (April 2016). Retrieved June 1, 2017 from https:\/\/goo.gl\/NZDRsD"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1929820.1929844"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/2028067.2028094"},{"key":"e_1_3_2_1_4_1","volume-title":"Summary of the Amazon S3 Service Disruption in the Northern Virginia (US-EAST-1) Region. AWS message. (March","author":"AWS","year":"2017","unstructured":"AWS message 2017. Summary of the Amazon S3 Service Disruption in the Northern Virginia (US-EAST-1) Region. AWS message. (March 2017 ). https:\/\/aws.amazon.com\/message\/41926\/ AWS message 2017. Summary of the Amazon S3 Service Disruption in the Northern Virginia (US-EAST-1) Region. AWS message. (March 2017). https:\/\/aws.amazon.com\/message\/41926\/"},{"key":"e_1_3_2_1_5_1","volume-title":"Sony's Yoshida: PSN Is Attacked By Hackers Every Day. Gameinformer. (March","author":"Bertz Matt","year":"2015","unstructured":"Matt Bertz . 2015. Sony's Yoshida: PSN Is Attacked By Hackers Every Day. Gameinformer. (March 2015 ). Retrieved June 1, 2017 from https:\/\/goo.gl\/nrviUG Matt Bertz. 2015. Sony's Yoshida: PSN Is Attacked By Hackers Every Day. Gameinformer. (March 2015). Retrieved June 1, 2017 from https:\/\/goo.gl\/nrviUG"},{"key":"e_1_3_2_1_6_1","volume-title":"NDSS 2011, 18th Annual Network and Distributed System Security Symposium","author":"Bilge Leyla","year":"2011","unstructured":"Leyla Bilge , Engin Kirda , Christopher Kruegel , and Marco Balduzzi . 2011 . EXPOSURE: Finding malicious domains using passive DNS analysis . In NDSS 2011, 18th Annual Network and Distributed System Security Symposium , 6-9 February 2011, San Diego, CA, USA. Internet Society, San Diego, UNITED STATES, Article 11, 17 pages. http:\/\/www.eurecom.fr\/publication\/3281 Leyla Bilge, Engin Kirda, Christopher Kruegel, and Marco Balduzzi. 2011. EXPOSURE: Finding malicious domains using passive DNS analysis. In NDSS 2011, 18th Annual Network and Distributed System Security Symposium, 6-9 February 2011, San Diego, CA, USA. Internet Society, San Diego, UNITED STATES, Article 11, 17 pages. http:\/\/www.eurecom.fr\/publication\/3281"},{"key":"e_1_3_2_1_7_1","volume-title":"Absence of epidemic threshold in scale-free networks with degree correlations. Physical review letters 90, 2","author":"Bogun\u00e1 Mari\u00e1n","year":"2003","unstructured":"Mari\u00e1n Bogun\u00e1 , Romualdo Pastor-Satorras , and Alessandro Vespignani . 2003. Absence of epidemic threshold in scale-free networks with degree correlations. Physical review letters 90, 2 ( 2003 ), 028701. Mari\u00e1n Bogun\u00e1, Romualdo Pastor-Satorras, and Alessandro Vespignani. 2003. Absence of epidemic threshold in scale-free networks with degree correlations. Physical review letters 90, 2 (2003), 028701."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1086\/228631"},{"key":"e_1_3_2_1_9_1","volume-title":"https:\/\/builtwith.com\/","author":"Built With Built With","year":"2017","unstructured":"Built With 2017. Built With . Website. ( 2017 ). https:\/\/builtwith.com\/ Built With 2017. Built With. Website. (2017). https:\/\/builtwith.com\/"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/832311.837386"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978301"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1137\/070710111"},{"key":"e_1_3_2_1_13_1","volume-title":"https:\/\/www.datanyze.com\/","author":"Datanyze Datanyze","year":"2017","unstructured":"Datanyze 2017. Datanyze . Website. ( 2017 ). https:\/\/www.datanyze.com\/ Datanyze 2017. Datanyze. Website. (2017). https:\/\/www.datanyze.com\/"},{"key":"e_1_3_2_1_14_1","volume-title":"Amazon AWS S3 outage is breaking things for a lot of websites and apps. TechCrunch. (February","author":"Etherington Darrell","year":"2017","unstructured":"Darrell Etherington . 2017. Amazon AWS S3 outage is breaking things for a lot of websites and apps. TechCrunch. (February 2017 ). Retrieved June 1, 2017 from https:\/\/techcrunch.com\/2017\/02\/28\/amazon-aws-s3-outage-is-breaking-things-for-a-lot-of-websites-and-apps\/ Darrell Etherington. 2017. Amazon AWS S3 outage is breaking things for a lot of websites and apps. TechCrunch. (February 2017). Retrieved June 1, 2017 from https:\/\/techcrunch.com\/2017\/02\/28\/amazon-aws-s3-outage-is-breaking-things-for-a-lot-of-websites-and-apps\/"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 3rd USENIX Conference on Large-scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More (LEET'10)","author":"Felegyhazi Mark","year":"2010","unstructured":"Mark Felegyhazi , Christian Kreibich , and Vern Paxson . 2010 . On the Potential of Proactive Domain Blacklisting . In Proceedings of the 3rd USENIX Conference on Large-scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More (LEET'10) . USENIX Association, Berkeley, CA, USA, Article 6, 8 pages. Mark Felegyhazi, Christian Kreibich, and Vern Paxson. 2010. On the Potential of Proactive Domain Blacklisting. In Proceedings of the 3rd USENIX Conference on Large-scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More (LEET'10). USENIX Association, Berkeley, CA, USA, Article 6, 8 pages."},{"key":"e_1_3_2_1_16_1","volume-title":"A Post Mortem on this Morning's Incident. Cloudflare blog. (June","author":"Fleury J\u00e9r\u00f4me","year":"2016","unstructured":"J\u00e9r\u00f4me Fleury . 2016. A Post Mortem on this Morning's Incident. Cloudflare blog. (June 2016 ). https:\/\/blog.cloudflare.com\/a-post-mortem-on-this-mornings-incident\/ J\u00e9r\u00f4me Fleury. 2016. A Post Mortem on this Morning's Incident. Cloudflare blog. (June 2016). https:\/\/blog.cloudflare.com\/a-post-mortem-on-this-mornings-incident\/"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.974527"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663743"},{"key":"e_1_3_2_1_19_1","volume-title":"What is 1e100.net? Google Help. (2017). Retrieved","author":"Google Help","year":"2017","unstructured":"Google Help 2017. What is 1e100.net? Google Help. (2017). Retrieved June 2, 2017 from https:\/\/support.google.com\/faqs\/answer\/174717?hl=en Google Help 2017. What is 1e100.net? Google Help. (2017). Retrieved June 2, 2017 from https:\/\/support.google.com\/faqs\/answer\/174717?hl=en"},{"key":"e_1_3_2_1_20_1","volume-title":"Topological Vulnerability Evaluation Model Based on Fractal Dimension of Complex Networks. PLOS ONE 11, 1 (01","author":"Gou Li","year":"2016","unstructured":"Li Gou , Bo Wei , Rehan Sadiq , Yong Sadiq , and Yong Deng . 2016. Topological Vulnerability Evaluation Model Based on Fractal Dimension of Complex Networks. PLOS ONE 11, 1 (01 2016 ), 1--11. Li Gou, Bo Wei, Rehan Sadiq, Yong Sadiq, and Yong Deng. 2016. Topological Vulnerability Evaluation Model Based on Fractal Dimension of Complex Networks. PLOS ONE 11, 1 (01 2016), 1--11."},{"key":"e_1_3_2_1_21_1","volume-title":"How the Dyn outage affected Cloudflare. Cloudflare blog. (October","author":"Graham-Cumming John","year":"2016","unstructured":"John Graham-Cumming . 2016. How the Dyn outage affected Cloudflare. Cloudflare blog. (October 2016 ). Retrieved June 1, 2017 from https:\/\/blog.cloudflare.com\/how-the-dyn-outage-affected-cloudflare\/ John Graham-Cumming. 2016. How the Dyn outage affected Cloudflare. Cloudflare blog. (October 2016). Retrieved June 1, 2017 from https:\/\/blog.cloudflare.com\/how-the-dyn-outage-affected-cloudflare\/"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382283"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504740"},{"key":"e_1_3_2_1_24_1","volume-title":"Freiling","author":"Holz Thorsten","year":"2008","unstructured":"Thorsten Holz , Christian Gorecki , Konrad Rieck , and Felix C . Freiling . 2008 . Measuring and Detecting Fast-Flux Service Networks. In NDSS (2009-06-18). The Internet Society , San Diego, CA, USA, Article 16, 12 pages. Thorsten Holz, Christian Gorecki, Konrad Rieck, and Felix C. Freiling. 2008. Measuring and Detecting Fast-Flux Service Networks. In NDSS (2009-06-18). The Internet Society, San Diego, CA, USA, Article 16, 12 pages."},{"key":"e_1_3_2_1_25_1","volume-title":"Cloud- Related Spending by Businesses to Triple from 2011 to","author":"IHS","year":"2017","unstructured":"IHS Markit 2011. Cloud- Related Spending by Businesses to Triple from 2011 to 2017 . IHS MarkitNews Releases . (2011). http:\/\/news.ihsmarkit.com\/press-release\/design-supply-chain\/cloud-related-spending-businesses-triple-2011-2017 IHS Markit 2011. Cloud- Related Spending by Businesses to Triple from 2011 to 2017. IHS MarkitNews Releases. (2011). http:\/\/news.ihsmarkit.com\/press-release\/design-supply-chain\/cloud-related-spending-businesses-triple-2011-2017"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1097\/WNR.0000000000000421"},{"key":"e_1_3_2_1_27_1","volume-title":"The Hacker News. (January","author":"Khandelwal Swati","year":"2016","unstructured":"Swati Khandelwal . 2016. 602 Gbps! This May Have Been the Largest DDoS Attack in History . The Hacker News. (January 2016 ). Retrieved June 1, 2017 from http:\/\/thehackernews.com\/2016\/01\/biggest-ddos-attack.html Swati Khandelwal. 2016. 602 Gbps! This May Have Been the Largest DDoS Attack in History. The Hacker News. (January 2016). Retrieved June 1, 2017 from http:\/\/thehackernews.com\/2016\/01\/biggest-ddos-attack.html"},{"volume-title":"Enabling Network Security Through Active DNS Datasets","author":"Kountouras Athanasios","key":"e_1_3_2_1_28_1","unstructured":"Athanasios Kountouras , Panagiotis Kintis , Chaz Lever , Yizheng Chen , Yacin Nadji , David Dagon , Manos Antonakakis , and Rodney Joffe . 2016. Enabling Network Security Through Active DNS Datasets . Springer International Publishing , Cham , 188--208. Athanasios Kountouras, Panagiotis Kintis, Chaz Lever, Yizheng Chen, Yacin Nadji, David Dagon, Manos Antonakakis, and Rodney Joffe. 2016. Enabling Network Security Through Active DNS Datasets. Springer International Publishing, Cham, 188--208."},{"key":"e_1_3_2_1_29_1","volume-title":"Brian Krebs' Blog Hit by 665 Gbps DDoS Attack. SecurityWeek. (February","author":"Kovacs Edward","year":"2016","unstructured":"Edward Kovacs . 2016. Brian Krebs' Blog Hit by 665 Gbps DDoS Attack. SecurityWeek. (February 2016 ). Retrieved June 1, 2017 from http:\/\/www.securityweek.com\/brian-krebs-blog-hit-665-gbps-ddos-attack Edward Kovacs. 2016. Brian Krebs' Blog Hit by 665 Gbps DDoS Attack. SecurityWeek. (February 2016). Retrieved June 1, 2017 from http:\/\/www.securityweek.com\/brian-krebs-blog-hit-665-gbps-ddos-attack"},{"key":"e_1_3_2_1_30_1","volume-title":"Spotify, Reddit. Krebs on Security. (October","author":"Krebs Brian","year":"2016","unstructured":"Brian Krebs . 2016. DDoS on Dyn Impacts Twitter , Spotify, Reddit. Krebs on Security. (October 2016 ). Retrieved June 1, 2017 from https:\/\/krebsonsecurity.com\/2016\/10\/ddos-on-dyn-impacts-twitter-spotify-reddit\/ Brian Krebs. 2016. DDoS on Dyn Impacts Twitter, Spotify, Reddit. Krebs on Security. (October 2016). Retrieved June 1, 2017 from https:\/\/krebsonsecurity.com\/2016\/10\/ddos-on-dyn-impacts-twitter-spotify-reddit\/"},{"key":"e_1_3_2_1_31_1","volume-title":"Britain's HSBC Recovers from Massive DDoS Attack. Security Week. (January","author":"Lennon Mike","year":"2016","unstructured":"Mike Lennon . 2016. Britain's HSBC Recovers from Massive DDoS Attack. Security Week. (January 2016 ). Retrieved June 1, 2017 from https:\/\/goo.gl\/haZbz8 Mike Lennon. 2016. Britain's HSBC Recovers from Massive DDoS Attack. Security Week. (January 2016). Retrieved June 1, 2017 from https:\/\/goo.gl\/haZbz8"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2010.03.018"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382274"},{"key":"e_1_3_2_1_34_1","volume-title":"Slack, Trello. VentureBeat. (February","author":"Novet Jordan","year":"2017","unstructured":"Jordan Novet . 2017. AWS is investigating S3 issues, affecting Quora , Slack, Trello. VentureBeat. (February 2017 ). Retrieved June 1, 2017 from https:\/\/venturebeat.com\/2017\/02\/28\/aws-is-investigating-s3-issues-affecting-quora-slack-trello\/ Jordan Novet. 2017. AWS is investigating S3 issues, affecting Quora, Slack, Trello. VentureBeat. (February 2017). Retrieved June 1, 2017 from https:\/\/venturebeat.com\/2017\/02\/28\/aws-is-investigating-s3-issues-affecting-quora-slack-trello\/"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2020798"},{"key":"e_1_3_2_1_36_1","volume-title":"OVH hosting hit by 1Tbps DDoS attack, the largest one ever seen. Security Affairs. (September","author":"Paganini Pierluigi","year":"2016","unstructured":"Pierluigi Paganini . 2016. OVH hosting hit by 1Tbps DDoS attack, the largest one ever seen. Security Affairs. (September 2016 ). Retrieved June 1, 2017 from http:\/\/securityaffairs.co\/wordpress\/51640\/cyber-crime\/tbps-ddos-attack.html Pierluigi Paganini. 2016. OVH hosting hit by 1Tbps DDoS attack, the largest one ever seen. Security Affairs. (September 2016). Retrieved June 1, 2017 from http:\/\/securityaffairs.co\/wordpress\/51640\/cyber-crime\/tbps-ddos-attack.html"},{"key":"e_1_3_2_1_37_1","volume-title":"Epidemic spreading in scale-free networks. Physical review letters 86, 14","author":"Pastor-Satorras Romualdo","year":"2001","unstructured":"Romualdo Pastor-Satorras and Alessandro Vespignani . 2001. Epidemic spreading in scale-free networks. Physical review letters 86, 14 ( 2001 ), 3200. Romualdo Pastor-Satorras and Alessandro Vespignani. 2001. Epidemic spreading in scale-free networks. Physical review letters 86, 14 (2001), 3200."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.65.035108"},{"key":"e_1_3_2_1_39_1","volume-title":"The DDoS That Knocked Spamhaus Offline (And How We Mitigated It). BGPmon.net. (March","author":"Prince Matthew","year":"2013","unstructured":"Matthew Prince . 2013. The DDoS That Knocked Spamhaus Offline (And How We Mitigated It). BGPmon.net. (March 2013 ). https:\/\/blog.cloudflare.com\/the-ddos-that-knocked-spamhaus-offline-and-ho\/ Matthew Prince. 2013. The DDoS That Knocked Spamhaus Offline (And How We Mitigated It). BGPmon.net. (March 2013). https:\/\/blog.cloudflare.com\/the-ddos-that-knocked-spamhaus-offline-and-ho\/"},{"key":"e_1_3_2_1_40_1","volume-title":"Technical Details Behind a 400 Gbps NTP Amplification DDoS Attack. Cloudflare blog. (February","author":"Prince Matthew","year":"2014","unstructured":"Matthew Prince . 2014. Technical Details Behind a 400 Gbps NTP Amplification DDoS Attack. Cloudflare blog. (February 2014 ). Retrieved June 1, 2017 from https:\/\/goo.gl\/K1EJHF Matthew Prince. 2014. Technical Details Behind a 400 Gbps NTP Amplification DDoS Attack. Cloudflare blog. (February 2014). Retrieved June 1, 2017 from https:\/\/goo.gl\/K1EJHF"},{"key":"e_1_3_2_1_41_1","volume-title":"Retrieved","author":"Sonar Project","year":"2013","unstructured":"Rapid7. 2013. Project Sonar . ( 2013 ). Retrieved June 1, 2017 from https:\/\/sonar.labs.rapid7.com\/ Rapid7. 2013. Project Sonar. (2013). Retrieved June 1, 2017 from https:\/\/sonar.labs.rapid7.com\/"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.03.034"},{"key":"e_1_3_2_1_43_1","unstructured":"Security ScoreCard. 2016. Automatic Vendor Detection -- Do You Know Who Your Vendors Are? Blog post. (2016). http:\/\/blog.securityscorecard.com\/2016\/02\/15\/automatic-vendor-detection-know-who-your-vendors-are\/  Security ScoreCard. 2016. Automatic Vendor Detection -- Do You Know Who Your Vendors Are? Blog post. (2016). http:\/\/blog.securityscorecard.com\/2016\/02\/15\/automatic-vendor-detection-know-who-your-vendors-are\/"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052587"},{"volume-title":"Using Centrality Measures in Dependency Risk Graphs for Efficient Risk Mitigation","author":"Stergiopoulos George","key":"e_1_3_2_1_45_1","unstructured":"George Stergiopoulos , Marianthi Theocharidou , Panayiotis Kotzanikolaou , and Dimitris Gritzalis . 2015. Using Centrality Measures in Dependency Risk Graphs for Efficient Risk Mitigation . Springer International Publishing , Arlington, VA, USA , 299--314. George Stergiopoulos, Marianthi Theocharidou, Panayiotis Kotzanikolaou, and Dimitris Gritzalis. 2015. Using Centrality Measures in Dependency Risk Graphs for Efficient Risk Mitigation. Springer International Publishing, Arlington, VA, USA, 299--314."},{"key":"e_1_3_2_1_46_1","volume-title":"Looking at the Spamaus DDOS from a BGP perspective. BGPmon.net. (March","author":"Toonk Andree","year":"2013","unstructured":"Andree Toonk . 2013. Looking at the Spamaus DDOS from a BGP perspective. BGPmon.net. (March 2013 ). https:\/\/bgpmon.net\/looking-at-the-spamhouse-ddos-from-a-bgp-perspective\/ Andree Toonk. 2013. Looking at the Spamaus DDOS from a BGP perspective. BGPmon.net. (March 2013). https:\/\/bgpmon.net\/looking-at-the-spamhouse-ddos-from-a-bgp-perspective\/"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2789996"},{"key":"e_1_3_2_1_48_1","volume-title":"Some Still Ongoing. Gameinformer. (December","author":"Wallace Kimberley","year":"2014","unstructured":"Kimberley Wallace . 2014. Xbox Live And PSN Issues Plague Christmas , Some Still Ongoing. Gameinformer. (December 2014 ). Retrieved June 1, 2017 from https:\/\/goo.gl\/c00RH2 Kimberley Wallace. 2014. Xbox Live And PSN Issues Plague Christmas, Some Still Ongoing. Gameinformer. (December 2014). Retrieved June 1, 2017 from https:\/\/goo.gl\/c00RH2"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2016.11.008"},{"key":"e_1_3_2_1_50_1","volume-title":"https:\/\/wappalyzer.com\/","author":"Wappalyzer Wappalyzer","year":"2017","unstructured":"Wappalyzer 2017. Wappalyzer . Website. ( 2017 ). https:\/\/wappalyzer.com\/ Wappalyzer 2017. Wappalyzer. Website. (2017). https:\/\/wappalyzer.com\/"},{"key":"e_1_3_2_1_51_1","volume-title":"17th AnnualFIRST Conference on Computer Security. FIRST","author":"Weimer Florian","year":"2005","unstructured":"Florian Weimer . 2005 . Passive DNS replication . In 17th AnnualFIRST Conference on Computer Security. FIRST , Singapore, 98. Florian Weimer. 2005. Passive DNS replication. In 17th AnnualFIRST Conference on Computer Security. FIRST, Singapore, 98."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.10.018"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879148"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1052812.1052825"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2007.19"}],"event":{"name":"ACSAC 2017: 2017 Annual Computer Security Applications Conference","acronym":"ACSAC 2017","location":"Orlando FL USA"},"container-title":["Proceedings of the 33rd Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134637","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134600.3134637","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:11Z","timestamp":1750217411000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134637"}},"subtitle":["Mining Internet Service Dependencies From Large-Scale DNS Data"],"short-title":[],"issued":{"date-parts":[[2017,12,4]]},"references-count":55,"alternative-id":["10.1145\/3134600.3134637","10.1145\/3134600"],"URL":"https:\/\/doi.org\/10.1145\/3134600.3134637","relation":{},"subject":[],"published":{"date-parts":[[2017,12,4]]},"assertion":[{"value":"2017-12-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}