{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T13:51:21Z","timestamp":1772113881499,"version":"3.50.1"},"reference-count":63,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,21]],"date-time":"2024-05-21T00:00:00Z","timestamp":1716249600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,21]],"date-time":"2024-05-21T00:00:00Z","timestamp":1716249600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,21]]},"DOI":"10.23919\/tma62044.2024.10559000","type":"proceedings-article","created":{"date-parts":[[2024,6,20]],"date-time":"2024-06-20T17:23:26Z","timestamp":1718904206000},"page":"1-11","source":"Crossref","is-referenced-by-count":1,"title":["Shielding Brands: An In-Depth Analysis of Defensive Domain Registration Practices Against Cyber-Squatting"],"prefix":"10.23919","author":[{"given":"Ben Chukwuemeka","family":"Benjamin","sequence":"first","affiliation":[{"name":"Univ. Grenoble Alpes, CNRS, Grenoble INP, LIG,Grenoble,France"}]},{"given":"Jan","family":"Bayer","sequence":"additional","affiliation":[{"name":"KOR Labs Cybersecurity,Grenoble,France"}]},{"given":"Simon","family":"Fernandez","sequence":"additional","affiliation":[{"name":"Univ. Grenoble Alpes, CNRS, Grenoble INP, LIG,Grenoble,France"}]},{"given":"Andrzej","family":"Duda","sequence":"additional","affiliation":[{"name":"Univ. Grenoble Alpes, CNRS, Grenoble INP, LIG,Grenoble,France"}]},{"given":"Maciej","family":"Korczy\u0144ski","sequence":"additional","affiliation":[{"name":"Univ. Grenoble Alpes, CNRS, Grenoble INP, LIG,Grenoble,France"}]}],"member":"263","reference":[{"key":"ref1","first-page":"191","article-title":"The Long \u201cTaile\u201d of Typosquatting Domain Names","volume-title":"USENIX Security Symposium","author":"Szurdi","year":"2014"},{"key":"ref2","volume-title":"Uniform Domain Name Dispute Resolution Policy","year":"1999"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2016.84"},{"key":"ref4","first-page":"1","article-title":"From Defensive Registration to Subdomain Protection: Evaluation of Email Anti-Spoofing Schemes for High-Profile Domains","volume-title":"TMA","author":"Maroofi","year":"2020"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2019.8802671"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134002"},{"key":"ref7","volume-title":"Why Defensive Domain Name Registrations Arent a Good Deal for Small Businesses","author":"Goldman","year":"2012"},{"key":"ref8","volume-title":"Defensive Registration - ICANN Wiki","year":"2022"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2567995"},{"key":"ref10","volume-title":"Markmonitor - domain management solutions, domain security","year":"1999"},{"key":"ref11","volume-title":"Corporate Domain Name Management for Brands - Com Laude","year":"2004"},{"key":"ref12","volume-title":"Passive DNS Historical Internet Database: Farsight DNSDB","year":"2022"},{"key":"ref13","volume-title":"Sunrise Period - ICANNWIki","year":"2021"},{"key":"ref14","volume-title":"Status Update: New gTLD Program: Next Round","year":"2024"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14738\/abr.612.5786"},{"key":"ref16","first-page":"65","article-title":"An Empirical Analysis of Fair Use Decisions Under the Uniform Domain-Name Dispute-Resolution Policy","volume":"53","author":"Simon","year":"2012","journal-title":"BCL Rev."},{"key":"ref17","volume-title":"Lanham Act","year":"2023"},{"key":"ref18","volume-title":"Rules for Uniform Domain Name Dispute Resolution Policy (the \u201cRules\u201d)","year":"2015"},{"key":"ref19","volume-title":"What is the Trademark Clearinghouse","author":"Clearinghouse","year":"2023"},{"key":"ref20","volume-title":"New gTLD Program Statistics","year":"2024"},{"key":"ref21","volume-title":"What is the Claims Period?"},{"key":"ref22","volume-title":"WIPO Domain Name Decisions"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23058"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.16"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.06.005"},{"issue":"31\u201336","key":"ref26","article-title":"Strider Typo-Patrol: Discovery and Analysis of Systematic Typo-Squatting","volume":"6","author":"Wang","year":"2006","journal-title":"USENIX SRUTI"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2019.00043"},{"key":"ref28","volume-title":"U.S. Court Rules For Facebook In Its Case Against Typosquatters On 105 Domains; $2.8M In Damages","year":"2013"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761388"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133988"},{"key":"ref31","article-title":"Bitsquatting: DNS Hijacking Without Exploitation","volume-title":"DE-FCON","author":"Dinaburg","year":"2011"},{"key":"ref32","volume-title":"Global Phishing Survey: Trends and Domain Name Use in 2016","year":"2016"},{"key":"ref33","volume-title":"PhishTank","author":"Ulevitch","year":"2006"},{"key":"ref34","volume-title":"OpenPhish","year":"2023"},{"key":"ref35","volume-title":"DNSTwist","author":"Ulikowski"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/eurosp48549.2020.00045"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-28486-1_24"},{"key":"ref38","volume-title":"Passive DNS Replication","author":"Weimer"},{"key":"ref39","volume-title":"Public Suffix Lists"},{"key":"ref40","volume-title":"Brand Protection Software"},{"key":"ref41","volume-title":"CSC The Most Security Conscious Domains Provider","year":"2008"},{"key":"ref42","volume-title":"GoDaddy Corporate Domains"},{"key":"ref43","volume-title":"Domain Names","author":"Lovells"},{"key":"ref44","volume-title":"Domain Names and Online Brand Protection","author":"Twins"},{"key":"ref45","volume-title":"Nameshield Secures Your Strategic Domain Names"},{"key":"ref46","volume-title":"RegistrarSEC \/ RegistrarSafe"},{"key":"ref47","volume-title":"Safebrands"},{"key":"ref48","volume-title":"Safenames - Global Domain Search, Registration and Protection"},{"key":"ref49","volume-title":"TLD Start Information","year":"2015"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14577-3_15"},{"key":"ref51","article-title":"Building a Resilient Domain Whitelist to Enhance Phishing Blocklist Accuracy","volume-title":"eCrime","author":"Jan","year":"2023"},{"key":"ref52","volume-title":"Domain Name Dispute Proceedings & Decisions","author":"Forum"},{"key":"ref53","volume-title":"UDRP Decisions","year":"2023"},{"key":"ref54","volume-title":"CIIDRC Decisions","year":"2023"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815696"},{"key":"ref56","volume-title":"An International Guide to Patent Case Management for Judges","year":"2024"},{"key":"ref57","volume-title":"Schedule of Fees under the UDRP","year":"2023"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39498-0_12"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3618257.3624805"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00072"},{"key":"ref61","volume-title":"The Majestic Million","year":"2019"},{"key":"ref62","volume-title":"The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research","author":"Dittrich","year":"2012"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/2896816"}],"event":{"name":"2024 8th Network Traffic Measurement and Analysis Conference (TMA)","location":"Dresden, Germany","start":{"date-parts":[[2024,5,21]]},"end":{"date-parts":[[2024,5,24]]}},"container-title":["2024 8th Network Traffic Measurement and Analysis Conference (TMA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10558852\/10558886\/10559000.pdf?arnumber=10559000","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T19:17:35Z","timestamp":1719343055000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10559000\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,21]]},"references-count":63,"URL":"https:\/\/doi.org\/10.23919\/tma62044.2024.10559000","relation":{},"subject":[],"published":{"date-parts":[[2024,5,21]]}}}