{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T03:21:05Z","timestamp":1730344865870,"version":"3.28.0"},"reference-count":63,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,21]],"date-time":"2024-05-21T00:00:00Z","timestamp":1716249600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,21]],"date-time":"2024-05-21T00:00:00Z","timestamp":1716249600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,21]]},"DOI":"10.23919\/tma62044.2024.10559182","type":"proceedings-article","created":{"date-parts":[[2024,6,20]],"date-time":"2024-06-20T17:23:26Z","timestamp":1718904206000},"page":"1-11","source":"Crossref","is-referenced-by-count":0,"title":["Evaluating the Impact of Design Decisions on Passive DNS-Based Domain Rankings"],"prefix":"10.23919","author":[{"given":"Victor","family":"Le Pochat","sequence":"first","affiliation":[{"name":"KU Leuven,DistriNet"}]},{"given":"Simon","family":"Fernandez","sequence":"additional","affiliation":[{"name":"Univ. Grenoble Alpes, CNRS, Grenoble INP, LIG"}]},{"given":"Tom","family":"Van Goethem","sequence":"additional","affiliation":[{"name":"KU Leuven,DistriNet"}]},{"given":"Samaneh","family":"Tajalizadehkhoob","sequence":"additional","affiliation":[{"name":"ICANN"}]},{"given":"Lieven","family":"Desmet","sequence":"additional","affiliation":[{"name":"KU Leuven,DistriNet"}]},{"given":"Andrzej","family":"Duda","sequence":"additional","affiliation":[{"name":"Univ. Grenoble Alpes, CNRS, Grenoble INP, LIG"}]},{"given":"Wouter","family":"Joosen","sequence":"additional","affiliation":[{"name":"KU Leuven,DistriNet"}]},{"given":"Maciej","family":"Korczy\u0144ski","sequence":"additional","affiliation":[{"name":"Univ. Grenoble Alpes, CNRS, Grenoble INP, LIG"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512214"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380113"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380104"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450050"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3607505.3607523"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3517745.3561444"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278574"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23386"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423626"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-16802-4_2"},{"volume-title":"Chrome UX Report","year":"2023","key":"ref11"},{"volume-title":"Cisco Umbrella 1 Million","year":"2016","author":"Hubbard","key":"ref12"},{"key":"ref13","article-title":"Goodbye, Alexa. Hello, Cloudflare Radar Domain Rankings","author":"Martinho","year":"2022","journal-title":"The Cloudflare Blog."},{"key":"ref14","article-title":"Mirror, Mirror, on the Wall, Whos the Fairest (website) of Them all?","author":"Gee-Clough","year":"2022","journal-title":"DomainTools"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355566"},{"key":"ref16","first-page":"13","article-title":"Passive DNS - Common Output Format","author":"Dulaunoy","year":"2023","journal-title":"Internet Engineering Task Force, Internet-Draft draft-dulaunoy-dnsop-passive-dns-cof-10"},{"journal-title":"SIE Europe UG","article-title":"A Breakthrough European Data Sharing Collective to Fight Cyber-crime","year":"2021","key":"ref17"},{"key":"ref18","article-title":"Building an Open, Robust, and Stable Voting-Based Domain Top List","volume-title":"31st USENIX Security Symposium, USENIX Security 22","author":"Xie","year":"2022"},{"key":"ref19","article-title":"Finding Top FQDNs Per Day in DNSDB Export MTBL Files (Part One of a Three Part Series)","author":"St Sauver","year":"2019","journal-title":"Farsight Security"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3651965"},{"volume-title":"cc-webgraph, Common Crawl","year":"2023","author":"Nagel","key":"ref21"},{"key":"ref22","article-title":"DNSFilter Top Domains","author":"Lowe","year":"2023","journal-title":"DNSFilter"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1064413.1064418"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31966-5_10"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15986-3_11"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30215-3_13"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3573834.3574533"},{"key":"ref28","article-title":"Evaluating the Long-term Effects of Parameters on the Characteristics of the Tranco Top Sites Ranking","volume-title":"12th USENIX Workshop on Cyber Security Experimentation and Test, CSET 19","author":"Le Pochat","year":"2019"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3517745.3561418"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-56249-5_12"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2013.6649442"},{"volume-title":"DNS Magnitude - A Popularity Figure for Domain Names, and its Application to L-root Traffic","year":"2020","author":"Mayrhofer","key":"ref32"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.03.008"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948216"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68914-0_2"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/938418"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2015.7417638"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2022.100469"},{"volume-title":"ISC Passive DNS Architecture","year":"2012","author":"Edmonds","key":"ref39"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278534"},{"key":"ref41","first-page":"1129","article-title":"End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking in Content Delivery Networks","volume-title":"27th USENIX Security Symposium, USENIX Security 18","author":"Hao","year":"2018"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423664"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0053"},{"key":"ref44","article-title":"What is a Bailiwick?","author":"St Sauver","year":"2017","journal-title":"Farsight Security"},{"volume-title":"A Stable and Open Method for Ranking Domains","year":"2019","author":"Coulondre","key":"ref45"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.3233\/SW-140134"},{"journal-title":"Mozilla Foundation","article-title":"Public Suffix List","year":"2022","key":"ref47"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15986-3_10"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-28486-1_21"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355580"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380124"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355568"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44081-7_7"},{"key":"ref54","article-title":"SAVing the Internet: Explaining the Adoption of Source Address Validation by Internet Service Providers","volume-title":"20th Annual Workshop on the Economics of Information Security, WEIS 20","author":"Lone","year":"2020"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833701"},{"key":"ref56","first-page":"143","article-title":"Zipfs Law and the Internet","volume":"3","author":"Adamic","year":"2002","journal-title":"Glottometrics"},{"issue":"4","key":"ref57","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1137\/070710111","article-title":"Power-Law Distributions in Empirical Data","volume":"51","author":"Clauset","year":"2009","journal-title":"SIAM Review"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.61"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24161"},{"key":"ref60","doi-asserted-by":"crossref","DOI":"10.17487\/RFC9076","volume-title":"DNS Privacy Considerations, RFC 9076","author":"Wicinski","year":"2021"},{"key":"ref61","article-title":"Enumerating Privacy Leaks in DNS Data Collected above the Recursive","volume-title":"2018 NDSS DNS Privacy Workshop","author":"Imana","year":"2018"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3472305.3472324"},{"key":"ref63","article-title":"The Impact of Passive DNS Collection on End-user Privacy","volume-title":"2nd Workshop on Securing and Trusting Internet Names, SATIN12","author":"Spring","year":"2012"}],"event":{"name":"2024 8th Network Traffic Measurement and Analysis Conference (TMA)","start":{"date-parts":[[2024,5,21]]},"location":"Dresden, Germany","end":{"date-parts":[[2024,5,24]]}},"container-title":["2024 8th Network Traffic Measurement and Analysis Conference (TMA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10558852\/10558886\/10559182.pdf?arnumber=10559182","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T19:17:40Z","timestamp":1719343060000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10559182\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,21]]},"references-count":63,"URL":"https:\/\/doi.org\/10.23919\/tma62044.2024.10559182","relation":{},"subject":[],"published":{"date-parts":[[2024,5,21]]}}}