{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:57:05Z","timestamp":1740103025103,"version":"3.37.3"},"reference-count":50,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,21]],"date-time":"2024-05-21T00:00:00Z","timestamp":1716249600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,21]],"date-time":"2024-05-21T00:00:00Z","timestamp":1716249600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002347","name":"BMBF","doi-asserted-by":"publisher","award":["16KIS1370,16KISK001K,16KISK107"],"award-info":[{"award-number":["16KIS1370,16KISK001K,16KISK107"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"German Research Foundation","doi-asserted-by":"publisher","award":["CA595\/13-1"],"award-info":[{"award-number":["CA595\/13-1"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,21]]},"DOI":"10.23919\/tma62044.2024.10559063","type":"proceedings-article","created":{"date-parts":[[2024,6,20]],"date-time":"2024-06-20T17:23:26Z","timestamp":1718904206000},"page":"1-11","source":"Crossref","is-referenced-by-count":0,"title":["Propagating Threat Scores with a TLS Ecosystem Graph Model Derived by Active Measurements"],"prefix":"10.23919","author":[{"given":"Markus","family":"Sosnowski","sequence":"first","affiliation":[{"name":"Technical University of Munich,Germany"}]},{"given":"Patrick","family":"Sattler","sequence":"additional","affiliation":[{"name":"Technical University of Munich,Germany"}]},{"given":"Johannes","family":"Zirngibl","sequence":"additional","affiliation":[{"name":"Technical University of Munich,Germany"}]},{"given":"Tim","family":"Betzer","sequence":"additional","affiliation":[{"name":"Technical University of Munich,Germany"}]},{"given":"Georg","family":"Carle","sequence":"additional","affiliation":[{"name":"Technical University of Munich,Germany"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Internet traffic 2009\u20132019","volume-title":"Proc. Asia Pacific Regional Internet Conf. Operational Technologies","author":"Labovitz","year":"2019"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3338498.3358655"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2024.3364526"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-28486-1_6"},{"journal-title":"Nearly half of malware now use TLS to conceal communications","year":"2021","author":"Gallagher","key":"ref5"},{"journal-title":"SSL Blacklist","year":"2024","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/icassp.2013.6638196"},{"volume-title":"ITEG: Additional Material","year":"2024","author":"Sosnowski","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1034"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5280"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487826"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-56252-5_13"},{"journal-title":"Apache Spark\u2122 - Unified engine for large-scale data analytics","year":"2023","key":"ref13"},{"key":"ref14","article-title":"RDF Primer","author":"Manola","year":"2004","journal-title":"W3C recommendation"},{"volume-title":"Graph Databases","year":"2013","author":"Robinson","key":"ref15"},{"key":"ref16","article-title":"Neo4j in Action","author":"Abedrabbo","year":"2014","journal-title":"Manning"},{"journal-title":"GraphFrames: DataFrame-based Graphs","year":"2024","key":"ref17"},{"journal-title":"Neo4j Graph Database & Analytics | Graph Database Management System","year":"2024","key":"ref18"},{"journal-title":"The Majestic Million","year":"2024","key":"ref19"},{"journal-title":"Umbrella Popularity List","year":"2023","key":"ref20"},{"journal-title":"Chrome User Experience Report","year":"2024","key":"ref21"},{"journal-title":"HSTS Preload List","year":"2024","key":"ref22"},{"journal-title":"Cloudflare Radar: Domain Rankings","year":"2024","key":"ref23"},{"journal-title":"OpenPhish - Phishing Intelligence","year":"2024","key":"ref24"},{"journal-title":"MassDNS","year":"2021","author":"Birk Blechschmidt","key":"ref25"},{"journal-title":"Unbound","year":"2023","key":"ref26"},{"key":"ref27","article-title":"ZMap: Fast internet-wide scanning and its security applications","volume-title":"Proc. USENIX Security Symposium","author":"Durumeric","year":"2013"},{"volume-title":"TUM goscanner","year":"2024","author":"Gasser","key":"ref28"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278564"},{"key":"ref30","article-title":"Domain Parking: Largely Present, Rarely Considered!","volume-title":"Proc. Network Traffic Measurement and Analysis Conference (TMA)","author":"Zirngibl","year":"2022"},{"journal-title":"VirusTotal","year":"2024","key":"ref31"},{"journal-title":"Safe Browsing - Making the worlds information safely accessible","year":"2024","key":"ref32"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504755"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3411740.3411742"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278568"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987462"},{"journal-title":"Easily Identify Malicious Servers on the Internet with JARM","year":"2020","author":"Althouse","key":"ref37"},{"key":"ref38","article-title":"Active TLS Stack Fingerprinting: Characterizing TLS Server Deployments at Scale","volume-title":"Proc. Network Traffic Measurement and Analysis Conference (TMA)","author":"Sosnowski","year":"2022"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC58397.2023.10218210"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/s0169-7552(98)00110-x"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012088469-8\/50052-8"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359791"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2881657"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3360867"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC46108.2020.9045113"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052587"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.17487\/rfc8555"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3424214"},{"key":"ref49","article-title":"The Menlo Report: Ethical principles guiding information and communication technology research","author":"Dittrich","year":"2012","journal-title":"US Department of Homeland Security"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2793013.2793014"}],"event":{"name":"2024 8th Network Traffic Measurement and Analysis Conference (TMA)","start":{"date-parts":[[2024,5,21]]},"location":"Dresden, Germany","end":{"date-parts":[[2024,5,24]]}},"container-title":["2024 8th Network Traffic Measurement and Analysis Conference (TMA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10558852\/10558886\/10559063.pdf?arnumber=10559063","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T19:17:35Z","timestamp":1719343055000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10559063\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,21]]},"references-count":50,"URL":"https:\/\/doi.org\/10.23919\/tma62044.2024.10559063","relation":{},"subject":[],"published":{"date-parts":[[2024,5,21]]}}}