{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T22:45:45Z","timestamp":1770417945831,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,9]]},"DOI":"10.1145\/3359789.3359836","type":"proceedings-article","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T18:41:59Z","timestamp":1574448119000},"page":"557-567","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Premadoma"],"prefix":"10.1145","author":[{"given":"Jan","family":"Spooren","sequence":"first","affiliation":[{"name":"imec - DistriNet, KU Leuven, Belgium"}]},{"given":"Thomas","family":"Vissers","sequence":"additional","affiliation":[{"name":"imec - DistriNet, KU Leuven, Belgium"}]},{"given":"Peter","family":"Janssen","sequence":"additional","affiliation":[{"name":"EURid VZW, Belgium"}]},{"given":"Wouter","family":"Joosen","sequence":"additional","affiliation":[{"name":"imec - DistriNet, KU Leuven, Belgium"}]},{"given":"Lieven","family":"Desmet","sequence":"additional","affiliation":[{"name":"imec - DistriNet, KU Leuven, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1929820.1929844"},{"key":"e_1_3_2_1_2_1","first-page":"27","volume-title":"Proceedings of the 20th USENIX Conference on Security","author":"Antonakakis Manos","unstructured":"Manos Antonakakis , Roberto Perdisci , Wenke Lee , Nikolaos Vasiloglou , II , and David Dagon . Detecting malware domains at the upper dns hierarchy . In Proceedings of the 20th USENIX Conference on Security , pages 27 -- 27 . Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou, II, and David Dagon. Detecting malware domains at the upper dns hierarchy. In Proceedings of the 20th USENIX Conference on Security, pages 27--27."},{"key":"e_1_3_2_1_3_1","volume-title":"Exposure: a passive dns analysis service to detect and report malicious domains. ACM Transactions on Information and System Security (TISSEC), 16(4):14","author":"Bilge Leyla","year":"2014","unstructured":"Leyla Bilge , Sevil Sen , Davide Balzarotti , Engin Kirda , and Christopher Kruegel . Exposure: a passive dns analysis service to detect and report malicious domains. ACM Transactions on Information and System Security (TISSEC), 16(4):14 , 2014 . Leyla Bilge, Sevil Sen, Davide Balzarotti, Engin Kirda, and Christopher Kruegel. Exposure: a passive dns analysis service to detect and report malicious domains. ACM Transactions on Information and System Security (TISSEC), 16(4):14, 2014."},{"key":"e_1_3_2_1_4_1","first-page":"1022","volume-title":"IJCAI","author":"Usama","year":"1993","unstructured":"Usama M. Fayyad and Keki B. Irani. Multi-interval discretization of continuous-valued attributes for classification learning . In IJCAI , pages 1022 -- 1029 , 1993 . Usama M. Fayyad and Keki B. Irani. Multi-interval discretization of continuous-valued attributes for classification learning. In IJCAI, pages 1022--1029, 1993."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855686.1855692"},{"key":"e_1_3_2_1_6_1","first-page":"144","volume-title":"Generating accurate rule sets without global optimization","author":"Frank Eibe","year":"1998","unstructured":"Eibe Frank and Ian H. Witten . Generating accurate rule sets without global optimization . pages 144 -- 151 . Morgan Kaufmann , 1998 . Eibe Frank and Ian H. Witten. Generating accurate rule sets without global optimization. pages 144--151. Morgan Kaufmann, 1998."},{"key":"e_1_3_2_1_7_1","volume-title":"Google Safe Browsing","year":"2016","unstructured":"Google. Google Safe Browsing , 2016 . https:\/\/developers.google.com\/safe-browsing\/. Google. Google Safe Browsing, 2016. https:\/\/developers.google.com\/safe-browsing\/."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068842"},{"key":"e_1_3_2_1_9_1","first-page":"1568","volume-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS '16","author":"Hao Shuang","year":"2016","unstructured":"Shuang Hao , Alex Kantchelian , Brad Miller , Vern Paxson , and Nick Feamster . Predator : Proactive recognition and elimination of domain abuse at time-of-registration . In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS '16 , pages 1568 -- 1579 , New York, NY, USA , 2016 . ACM. Shuang Hao, Alex Kantchelian, Brad Miller, Vern Paxson, and Nick Feamster. Predator: Proactive recognition and elimination of domain abuse at time-of-registration. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS '16, pages 1568--1579, New York, NY, USA, 2016. ACM."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504753"},{"key":"e_1_3_2_1_11_1","series-title":"Springer Series in Statistics","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-21606-5","volume-title":"The Elements of Statistical Learning","author":"Hastie Trevor","year":"2001","unstructured":"Trevor Hastie , Robert Tibshirani , and Jerome Friedman . The Elements of Statistical Learning . Springer Series in Statistics . 2001 . Trevor Hastie, Robert Tibshirani, and Jerome Friedman. The Elements of Statistical Learning. Springer Series in Statistics. 2001."},{"key":"e_1_3_2_1_12_1","first-page":"2013","volume-title":"2013 Registrar Accreditation Agreement","author":"ICANN.","year":"2013","unstructured":"ICANN. 2013 Registrar Accreditation Agreement , 2013 . https:\/\/www.icann.org\/resources\/pages\/approved-with-specs- 2013 - 2009 -17-en#whois-accuracy. ICANN. 2013 Registrar Accreditation Agreement, 2013. https:\/\/www.icann.org\/resources\/pages\/approved-with-specs-2013-09-17-en#whois-accuracy."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIS.2018.00015"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/3468.618255"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1972441.1972448"},{"key":"e_1_3_2_1_16_1","unstructured":"MaxMind Inc. GeoLite2 Free Downloadable Databases 2016. https:\/\/dev.maxmind.com\/geoip\/geoip2\/geolite2\/.  MaxMind Inc. GeoLite2 Free Downloadable Databases 2016. https:\/\/dev.maxmind.com\/geoip\/geoip2\/geolite2\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502961"},{"key":"e_1_3_2_1_18_1","unstructured":"Rob Renaud. Gibberish Detector. https:\/\/github.com\/rrenaud\/Gibberish-Detector.  Rob Renaud. Gibberish Detector. https:\/\/github.com\/rrenaud\/Gibberish-Detector."},{"key":"e_1_3_2_1_19_1","volume-title":"SURBL - URI Reputation Data","author":"SURBL.","year":"2016","unstructured":"SURBL. SURBL - URI Reputation Data , 2016 . http:\/\/www.surbl.org. SURBL. SURBL - URI Reputation Data, 2016. http:\/\/www.surbl.org."},{"key":"e_1_3_2_1_20_1","volume-title":"The Domain Block List","author":"Project Ltd The Spamhaus","year":"2016","unstructured":"The Spamhaus Project Ltd . The Domain Block List , 2016 . https:\/\/www.spamhaus.org\/dbl\/. The Spamhaus Project Ltd. The Domain Block List, 2016. https:\/\/www.spamhaus.org\/dbl\/."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2019.00045"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66332-6_21"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3203422.3203423"},{"key":"e_1_3_2_1_24_1","first-page":"73","volume-title":"Proc. of the 2014 Virus Bulletin Intl. Conf","author":"Xu Wei","year":"2014","unstructured":"Wei Xu , Kyle Sanders , and Yanxin Zhang . We know it before you do: predicting malicious domains . In Proc. of the 2014 Virus Bulletin Intl. Conf , pages 73 -- 77 , 2014 . Wei Xu, Kyle Sanders, and Yanxin Zhang. We know it before you do: predicting malicious domains. In Proc. of the 2014 Virus Bulletin Intl. Conf, pages 73--77, 2014."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1078"}],"event":{"name":"ACSAC '19: 2019 Annual Computer Security Applications Conference","location":"San Juan Puerto Rico USA","acronym":"ACSAC '19"},"container-title":["Proceedings of the 35th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359836","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359836","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:45:04Z","timestamp":1750203904000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359836"}},"subtitle":["an operational solution for DNS registries to prevent malicious domain registrations"],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"references-count":25,"alternative-id":["10.1145\/3359789.3359836","10.1145\/3359789"],"URL":"https:\/\/doi.org\/10.1145\/3359789.3359836","relation":{},"subject":[],"published":{"date-parts":[[2019,12,9]]},"assertion":[{"value":"2019-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}