{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T23:38:21Z","timestamp":1765841901584,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":79,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,27]],"date-time":"2020-10-27T00:00:00Z","timestamp":1603756800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"U.S. Department of Homeland Security","award":["D15PC00184"],"award-info":[{"award-number":["D15PC00184"]}]},{"DOI":"10.13039\/501100004801","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1518918,1834263"],"award-info":[{"award-number":["1518918,1834263"]}],"id":[{"id":"10.13039\/501100004801","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,27]]},"DOI":"10.1145\/3419394.3423657","type":"proceedings-article","created":{"date-parts":[[2020,10,22]],"date-time":"2020-10-22T20:30:22Z","timestamp":1603398622000},"page":"360-369","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Quantifying the Impact of Blocklisting in the Age of Address Reuse"],"prefix":"10.1145","author":[{"given":"Sivaramakrishnan","family":"Ramanathan","sequence":"first","affiliation":[{"name":"University of Southern California"}]},{"given":"Anushah","family":"Hossain","sequence":"additional","affiliation":[{"name":"UC Berkeley, ICSI"}]},{"given":"Jelena","family":"Mirkovic","sequence":"additional","affiliation":[{"name":"USC Information Sciences Institute"}]},{"given":"Minlan","family":"Yu","sequence":"additional","affiliation":[{"name":"Harvard University"}]},{"given":"Sadia","family":"Afroz","sequence":"additional","affiliation":[{"name":"ICSI\/Avast"}]}],"member":"320","published-online":{"date-parts":[[2020,10,27]]},"reference":[{"volume-title":"Swiss Security Blog - Abuse.ch. https:\/\/www.abuse.ch\/. (May","year":"2020","key":"e_1_3_2_2_1_1","unstructured":"Abuse.ch. 2020. Swiss Security Blog - Abuse.ch. https:\/\/www.abuse.ch\/. (May 2020)."},{"volume-title":"Alienvault Reputation System. https:\/\/www.alienvault.com\/. (May","year":"2020","key":"e_1_3_2_2_2_1","unstructured":"Alienvault. 2020. Alienvault Reputation System. https:\/\/www.alienvault.com\/. (May 2020)."},{"volume-title":"http:\/\/antispam.imp.ch\/. (May","year":"2020","key":"e_1_3_2_2_3_1","unstructured":"Antispam. 2020. ImproWare. http:\/\/antispam.imp.ch\/. (May 2020). (Accessed on 05\/13\/2020)."},{"key":"e_1_3_2_2_4_1","volume-title":"Can an American judge take a British company offline? (October","author":"Arthur Charles","year":"2006","unstructured":"Charles Arthur. 2006. Can an American judge take a British company offline? (October 2006). https:\/\/www.theguardian.com\/technology\/2006\/oct\/19\/guardianweeklytechnologysection3"},{"key":"e_1_3_2_2_5_1","volume-title":"badips.com | an IP based abuse tracker. https:\/\/www.badips.com\/. (May","author":"IPs.","year":"2020","unstructured":"BadIPs. 2020. badips.com | an IP based abuse tracker. https:\/\/www.badips.com\/. (May 2020)."},{"key":"e_1_3_2_2_6_1","unstructured":"Bambenek. 2020. Bambenek Consulting Feeds. http:\/\/osint.bambenekconsulting.com\/feeds\/. (May 2020)."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637243"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24668-8_16"},{"volume-title":"https:\/\/www.blocklist.de\/en\/index.html. (May","year":"2020","key":"e_1_3_2_2_9_1","unstructured":"Blocklist.de. 2020. Blocklist.de fail2ban reporting service. https:\/\/www.blocklist.de\/en\/index.html. (May 2020)."},{"volume-title":"We catch bots so that you don't have to. https:\/\/www.botscout.com. (May","year":"2020","key":"e_1_3_2_2_10_1","unstructured":"Botscout. 2020. We catch bots so that you don't have to. https:\/\/www.botscout.com. (May 2020)."},{"key":"e_1_3_2_2_11_1","unstructured":"Botvrij. 2020. botvrij.eu - powered by MISP. http:\/\/www.botvrij.eu\/. (May 2020)."},{"key":"e_1_3_2_2_12_1","volume-title":"hpHosts - by Malware Bytes. https:\/\/hosts-file.net\/. (May","author":"Bytes Malware","year":"2020","unstructured":"Malware Bytes. 2020. hpHosts - by Malware Bytes. https:\/\/hosts-file.net\/. (May 2020)."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851196"},{"volume-title":"Spamd tarpit and greylisting daemon. https:\/\/calomel.org\/spamd_config.html. (Jan","year":"2017","key":"e_1_3_2_2_14_1","unstructured":"Calomel. 2017. Spamd tarpit and greylisting daemon. https:\/\/calomel.org\/spamd_config.html. (Jan 2017)."},{"volume-title":"4th {USENIX} Symposium on Networked Systems Design & Implementation ({NSDI} 07).","author":"Casado Martin","key":"e_1_3_2_2_15_1","unstructured":"Martin Casado and Michael J Freedman. 2007. Peering through the shroud: The effect of edge opacity on IP-based client identification. In 4th {USENIX} Symposium on Networked Systems Design & Implementation ({NSDI} 07)."},{"key":"e_1_3_2_2_16_1","volume-title":"Taichung Education Center. https:\/\/www.tc.edu.tw\/net\/netflow\/lkout\/recent\/30. (May","author":"Taichung Education Center","year":"2020","unstructured":"Taichung Education Center. 2020. Taichung Education Center. https:\/\/www.tc.edu.tw\/net\/netflow\/lkout\/recent\/30. (May 2020)."},{"volume-title":"http:\/\/ciarmy.com\/. (May","year":"2020","key":"e_1_3_2_2_17_1","unstructured":"CIArmy. 2020. CINSscore. http:\/\/ciarmy.com\/. (May 2020)."},{"key":"e_1_3_2_2_18_1","unstructured":"Cisco. 2020. Cisco Talos - Additional Resources. http:\/\/www.talosintelligence.com\/. (May 2020)."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CATCH.2009.38"},{"volume-title":"Cloud spam protection for forums, boards, blogs and sites. https:\/\/www.cleantalk.org. (May","year":"2020","key":"e_1_3_2_2_20_1","unstructured":"Cleantalk. 2020. Cloud spam protection for forums, boards, blogs and sites. https:\/\/www.cleantalk.org. (May 2020)."},{"key":"e_1_3_2_2_21_1","unstructured":"Cloudflare. 2020. Understanding Cloudflare Challenge Passage (Captcha). https:\/\/support.cloudflare.com\/hc\/en-us\/articles\/200170136. (Feb R@2020)."},{"key":"e_1_3_2_2_22_1","volume-title":"The GPF DNS Block List. https:\/\/www.gpf-comics.com\/dnsbl\/. (May","author":"Comics GPF","year":"2020","unstructured":"GPF Comics. 2020. The GPF DNS Block List. https:\/\/www.gpf-comics.com\/dnsbl\/. (May 2020)."},{"key":"e_1_3_2_2_23_1","unstructured":"Cloudflare Community. 2018. Getting Cloudflare capcha on almost every website I visit for my home network. Help! https:\/\/community.cloudflare.com\/t\/getting-cloudflare-capcha-on-almost-every-website-i-visit-for-my-home-network-help\/42534. (Nov 2018)."},{"key":"e_1_3_2_2_24_1","volume-title":"Blocked IP address: Sharing IPs. https:\/\/community.cloudflare.com\/t\/cloudflare-blocking-my-ip\/65453\/57. (Mar","author":"Community Cloudflare","year":"2019","unstructured":"Cloudflare Community. 2019. Blocked IP address: Sharing IPs. https:\/\/community.cloudflare.com\/t\/cloudflare-blocking-my-ip\/65453\/57. (Mar 2019)."},{"key":"e_1_3_2_2_25_1","volume-title":"Community Tip - Best Practices For Captcha Challenges. https:\/\/community.cloudflare.com\/t\/community-tip-best-practices-for-captcha-challenges\/56301. (Jan","author":"Community Cloudflare","year":"2019","unstructured":"Cloudflare Community. 2019. Community Tip - Best Practices For Captcha Challenges. https:\/\/community.cloudflare.com\/t\/community-tip-best-practices-for-captcha-challenges\/56301. (Jan 2019)."},{"key":"e_1_3_2_2_26_1","volume-title":"http:\/\/www.cruzit.com\/wbl.php. (May","author":"Server It.","year":"2020","unstructured":"CruzIt. 2020. Server Blocklist \/ Blacklist - CruzIT.com - PHP, Linux & DNS Tools, Apache, MySQL, Postfix, Web & Email Spam Prevention Information. http:\/\/www.cruzit.com\/wbl.php. (May 2020)."},{"key":"e_1_3_2_2_27_1","volume-title":"http:\/\/cybercrime-tracker.net\/. (May","author":"Tracker CyberCrime","year":"2020","unstructured":"Cybercrime. 2020. CyberCrime Tracker. http:\/\/cybercrime-tracker.net\/. (May 2020)."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2567561.2567568"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2559218"},{"key":"e_1_3_2_2_30_1","volume-title":"Binary Defense Systems | Defend. Protect. Secure. https:\/\/www.binarydefense.com\/. (May","author":"Defense Binary","year":"2020","unstructured":"Binary Defense. 2020. Binary Defense Systems | Defend. Protect. Secure. https:\/\/www.binarydefense.com\/. (May 2020)."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355571"},{"key":"e_1_3_2_2_32_1","unstructured":"DYN. 2020. Index of \/pub\/malware-feeds\/. http:\/\/security-research.dyndns.org\/pub\/malware-feeds\/. (May 2020)."},{"key":"e_1_3_2_2_33_1","volume-title":"IP Blacklist Cloud - Protect your website. https:\/\/www.ip-finder.me\/. (May","author":"IP","year":"2020","unstructured":"IP finder. 2020. IP Blacklist Cloud - Protect your website. https:\/\/www.ip-finder.me\/. (May 2020)."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987445"},{"key":"e_1_3_2_2_35_1","volume-title":"https:\/\/forums.businesshelp.comcast.com\/t5\/Connectivity\/Dirty-blacklisted-IPs-issued-to-Comcast-Business-Account-holders\/td-p\/34297. (Mar","author":"Forums Comcast","year":"2018","unstructured":"Comcast Forums. 2018. Dirty (blacklisted) IPs issued to Comcast Business Account holders. https:\/\/forums.businesshelp.comcast.com\/t5\/Connectivity\/Dirty-blacklisted-IPs-issued-to-Comcast-Business-Account-holders\/td-p\/34297. (Mar 2018)."},{"key":"e_1_3_2_2_36_1","volume-title":"Verizon will do nothing. https:\/\/forums.verizon.com\/t5\/Fios-Internet\/IP-address-blocked-by-SORBS-Verizon-will-do-nothing\/td-p\/892536. (Feb","author":"Forums Verizon","year":"2020","unstructured":"Verizon Forums. 2020. IP address blocked by SORBS, Verizon will do nothing. https:\/\/forums.verizon.com\/t5\/Fios-Internet\/IP-address-blocked-by-SORBS-Verizon-will-do-nothing\/td-p\/892536. (Feb 2020)."},{"key":"e_1_3_2_2_37_1","unstructured":"Daniel Gerzo. 2020. Daniel Gerzo BruteForceBlocker. http:\/\/danger.rulez.sk\/index.php\/bruteforceblocker\/. (May 2020)."},{"volume-title":"Greensnow Statistics. https:\/\/greensnow.co\/. (May","year":"2020","key":"e_1_3_2_2_38_1","unstructured":"Greensnow. 2020. Greensnow Statistics. https:\/\/greensnow.co\/. (May 2020)."},{"key":"e_1_3_2_2_39_1","unstructured":"Charles B.Haley. 2020. SSH Dictionary Attacks. http:\/\/charles.the-haleys.org\/. (May 2020)."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452542"},{"key":"e_1_3_2_2_41_1","volume-title":"https:\/\/www.projecthoneypot.org\/. (May","author":"Honeypot Project","year":"2020","unstructured":"Project Honeypot. 2020. Project Honeypot. https:\/\/www.projecthoneypot.org\/. (May 2020)."},{"key":"e_1_3_2_2_42_1","volume-title":"IBM X-Force Exchange. https:\/\/exchange.xforce.ibmcloud.com\/. (May","author":"IBM.","year":"2020","unstructured":"IBM. 2020. IBM X-Force Exchange. https:\/\/exchange.xforce.ibmcloud.com\/. (May 2020)."},{"key":"e_1_3_2_2_43_1","volume-title":"Internet Storm Center. https:\/\/dshield.org\/about.html. (Sept","author":"SANS Institute","year":"2019","unstructured":"SANS Institute. 2019. Internet Storm Center. https:\/\/dshield.org\/about.html. (Sept 2019)."},{"key":"e_1_3_2_2_44_1","volume-title":"My IP - Blacklist Checks. https:\/\/www.myip.ms\/info\/about. (May","author":"My IP.","year":"2020","unstructured":"My IP. 2020. My IP - Blacklist Checks. https:\/\/www.myip.ms\/info\/about. (May 2020)."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879173"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"crossref","unstructured":"M Kucherawy and D Crocker. 2012. Email greylisting: An applicability statement for smtp. Technical Report. RFC 6647 June.","DOI":"10.17487\/rfc6647"},{"key":"e_1_3_2_2_47_1","volume-title":"Sourcefire VRT Labs. https:\/\/labs.snort.org\/. (May","author":"Labs Snort","year":"2020","unstructured":"Snort Labs. 2020. Sourcefire VRT Labs. https:\/\/labs.snort.org\/. (May 2020)."},{"key":"e_1_3_2_2_48_1","unstructured":"Malware Domain List. 2020. Malware Domain List. http:\/\/www.malwaredomainlist.com\/. (May 2020)."},{"volume-title":"Inferring Carrier-Grade NAT Deployment in the Wild. In IEEE Conference on Computer Communications (INFOCOM).","author":"Livadariu I.","key":"e_1_3_2_2_49_1","unstructured":"I. Livadariu, K. Benson, A. Elmokashfi, A. Dainotti, and A. Dhamdhere. 2018. Inferring Carrier-Grade NAT Deployment in the Wild. In IEEE Conference on Computer Communications (INFOCOM)."},{"volume-title":"http:\/\/malc0de.com\/database\/. (May","year":"2020","key":"e_1_3_2_2_50_1","unstructured":"Malc0de. 2020. Malc0de Database. http:\/\/malc0de.com\/database\/. (May 2020)."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020452"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535828.2535833"},{"key":"e_1_3_2_2_53_1","volume-title":"https:\/\/blocklist.net.ua\/. (May","author":"BlockList Blocklist NET.","year":"2020","unstructured":"Blocklist NET. 2020. BlockList.net.ua. https:\/\/blocklist.net.ua\/. (May 2020)."},{"volume-title":"Normshield - Cyber Risk Scorecard. https:\/\/www.normshield.com\/. (May","year":"2020","key":"e_1_3_2_2_54_1","unstructured":"Normshield. 2020. Normshield - Cyber Risk Scorecard. https:\/\/www.normshield.com\/. (May 2020)."},{"key":"e_1_3_2_2_55_1","unstructured":"NoThink. 2020. NoThink Individual Blacklist Maintainer. http:\/\/www.nothink.org\/. (May 2020)."},{"volume-title":"nullsecure. https:\/\/nullsecure.org\/. (May","year":"2020","key":"e_1_3_2_2_56_1","unstructured":"Nullsecure. 2020. nullsecure. https:\/\/nullsecure.org\/. (May 2020)."},{"key":"e_1_3_2_2_57_1","volume-title":"https:\/\/goo.gl\/jsyksA. (May","author":"Online Heise","year":"2020","unstructured":"Heise Online. 2020. Nixspam Blacklist. https:\/\/goo.gl\/jsyksA. (May 2020)."},{"volume-title":"Reasons Dynamic Addresses Change. In Internet Measurement Conference (IMC).","author":"Padmanabhan R.","key":"e_1_3_2_2_58_1","unstructured":"R. Padmanabhan, A. Dhamdhere, E. Aben, k. claffy, and N. Spring. 2016. Reasons Dynamic Addresses Change. In Internet Measurement Conference (IMC)."},{"key":"e_1_3_2_2_59_1","volume-title":"Spectrum Static IP. https:\/\/partners.spectrum.com\/content\/spectrum\/business\/en\/internet\/staticip.html. (May","author":"Partners Spectrum","year":"2020","unstructured":"Spectrum Partners. 2020. Spectrum Static IP. https:\/\/partners.spectrum.com\/content\/spectrum\/business\/en\/internet\/staticip.html. (May 2020)."},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24232"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987473"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987474"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2011.20"},{"key":"e_1_3_2_2_64_1","unstructured":"Sblam. 2020. Sblam! http:\/\/sblam.com\/. (May 2020)."},{"key":"e_1_3_2_2_65_1","volume-title":"Stop Forum Spam. https:\/\/stopforumspam.com\/. (May","author":"Spam Stop Forum","year":"2020","unstructured":"Stop Forum Spam. 2020. Stop Forum Spam. https:\/\/stopforumspam.com\/. (May 2020)."},{"key":"e_1_3_2_2_66_1","volume-title":"ATT raises prices 7% by making its customers pay ATT's property taxes. https:\/\/arstechnica.com\/tech-policy\/2019\/10\/att-raises-prices-7-by-making-its-customers-pay-atts-property-taxes\/. (Oct","author":"Technica ARS","year":"2020","unstructured":"ARS Technica. 2020. ATT raises prices 7% by making its customers pay ATT's property taxes. https:\/\/arstechnica.com\/tech-policy\/2019\/10\/att-raises-prices-7-by-making-its-customers-pay-atts-property-taxes\/. (Oct 2020)."},{"volume-title":"Threat Crowd - Open Source Threat Intelligence. https:\/\/threatcrowd.org\/. (May","year":"2020","key":"e_1_3_2_2_67_1","unstructured":"Threatcrowd. 2020. Threat Crowd - Open Source Threat Intelligence. https:\/\/threatcrowd.org\/. (May 2020)."},{"key":"e_1_3_2_2_68_1","volume-title":"Emerging Threats Rules. https:\/\/rules.emergingthreats.net\/fwrules\/emerging-Block-IPs.txt. (May","author":"Threats Emerging","year":"2020","unstructured":"Emerging Threats. 2020. Emerging Threats Rules. https:\/\/rules.emergingthreats.net\/fwrules\/emerging-Block-IPs.txt. (May 2020)."},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.7125\/APAN.30.5"},{"volume-title":"Project:Turris. https:\/\/www.turris.cz\/en\/greylist. (May","year":"2020","key":"e_1_3_2_2_70_1","unstructured":"Turris. 2020. Greylist:: Project:Turris. https:\/\/www.turris.cz\/en\/greylist. (May 2020)."},{"key":"e_1_3_2_2_71_1","unstructured":"URLVir. 2020. URLVir: Monitor Malicious Executable Urls. http:\/\/www.urlvir.com\/. (May 2020). (Accessed on 05\/13\/2020)."},{"key":"e_1_3_2_2_72_1","unstructured":"VX Vault. 2020. VX Vault ViriList. http:\/\/vxvault.net\/ViriList.php. (May 2020)."},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018479"},{"key":"e_1_3_2_2_74_1","volume-title":"Other Trick For Blocking Spam. https:\/\/cwiki.apache.org\/confluence\/display\/SPAMASSASSIN\/OtherTricks#OtherTricks-Greylisting. (Jul","author":"Wiki Apache","year":"2019","unstructured":"Apache Wiki. 2019. Other Trick For Blocking Spam. https:\/\/cwiki.apache.org\/confluence\/display\/SPAMASSASSIN\/OtherTricks#OtherTricks-Greylisting. (Jul 2019)."},{"volume-title":"The Free Encyclopedia. (June","year":"2019","key":"e_1_3_2_2_75_1","unstructured":"Wikipedia. 2019. Internet network operators' group --- Wikipedia, The Free Encyclopedia. (June 2019). https:\/\/en.wikipedia.org\/w\/index.php?title=Internet_network_operators%27_group&oldid=906511356"},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2010.5466660"},{"volume-title":"Business Class Internet at Home. https:\/\/www.xfinity.com\/hub\/business\/internet-for-home-business. (May","year":"2020","key":"e_1_3_2_2_77_1","unstructured":"Xfinity. 2020. Business Class Internet at Home. https:\/\/www.xfinity.com\/hub\/business\/internet-for-home-business. (May 2020)."},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282415"},{"volume-title":"https:\/\/gitlab.com\/ZeroDot1\/CoinBlockerLists. (May","year":"2020","key":"e_1_3_2_2_79_1","unstructured":"ZeroDot1. 2020. CoinBlockerLists. https:\/\/gitlab.com\/ZeroDot1\/CoinBlockerLists. (May 2020)."}],"event":{"name":"IMC '20: ACM Internet Measurement Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation"],"location":"Virtual Event USA","acronym":"IMC '20"},"container-title":["Proceedings of the ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419394.3423657","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3419394.3423657","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T23:36:38Z","timestamp":1765841798000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419394.3423657"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,27]]},"references-count":79,"alternative-id":["10.1145\/3419394.3423657","10.1145\/3419394"],"URL":"https:\/\/doi.org\/10.1145\/3419394.3423657","relation":{},"subject":[],"published":{"date-parts":[[2020,10,27]]},"assertion":[{"value":"2020-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}