{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T21:02:16Z","timestamp":1730322136997,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T00:00:00Z","timestamp":1571616000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Bundesministerium f\u00fcr Bildung und Forschung","award":["16KIS0530"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,21]]},"DOI":"10.1145\/3355369.3355598","type":"proceedings-article","created":{"date-parts":[[2019,10,18]],"date-time":"2019-10-18T12:57:15Z","timestamp":1571403435000},"page":"351-357","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Prefix Top Lists"],"prefix":"10.1145","author":[{"given":"Johannes","family":"Naab","sequence":"first","affiliation":[{"name":"Technical University of Munich"}]},{"given":"Patrick","family":"Sattler","sequence":"additional","affiliation":[{"name":"Technical University of Munich"}]},{"given":"Jonas","family":"Jelten","sequence":"additional","affiliation":[{"name":"Technical University of Munich"}]},{"given":"Oliver","family":"Gasser","sequence":"additional","affiliation":[{"name":"Technical University of Munich"}]},{"given":"Georg","family":"Carle","sequence":"additional","affiliation":[{"name":"Technical University of Munich"}]}],"member":"320","published-online":{"date-parts":[[2019,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"143","article-title":"Zipf's law and the Internet","volume":"3","author":"Adamic Lada A","year":"2002","journal-title":"Glottometrics"},{"key":"e_1_3_2_1_2_1","unstructured":"Alexa. May 13 2019. Top 1M sites. https:\/\/www.alexa.com\/topsites. http:\/\/s3.dualstack.us-east-1.amazonaws.com\/alexa-static\/top-1m.csv.zip. Alexa. May 13 2019. Top 1M sites. https:\/\/www.alexa.com\/topsites. http:\/\/s3.dualstack.us-east-1.amazonaws.com\/alexa-static\/top-1m.csv.zip."},{"key":"e_1_3_2_1_3_1","unstructured":"Alexa. May 13 2019. What's going on with my Alexa Rank? https:\/\/support.alexa.com\/hc\/en-us\/articles\/200449614. Alexa. May 13 2019. What's going on with my Alexa Rank? https:\/\/support.alexa.com\/hc\/en-us\/articles\/200449614."},{"volume-title":"Proceedings of the Internet Measurement Conference","year":"2018","author":"Allman Mark","key":"e_1_3_2_1_4_1"},{"volume-title":"Proceedings of the Internet Measurement Conference","year":"2007","author":"Allman Mark","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","unstructured":"Tim Berners-Lee. 1998. The Fractal nature of the Web. http:\/\/edshare.soton.ac.uk\/392\/3\/DesignIssues\/Fractal.html. Tim Berners-Lee. 1998. The Fractal nature of the Web. http:\/\/edshare.soton.ac.uk\/392\/3\/DesignIssues\/Fractal.html."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"St\u00e9phane Bortzmeyer. 2016. DNS Query Name Minimisation to Improve Privacy. RFC 7816 (Experimental). https:\/\/doi.org\/10.17487\/RFC7816 St\u00e9phane Bortzmeyer. 2016. DNS Query Name Minimisation to Improve Privacy. RFC 7816 (Experimental). https:\/\/doi.org\/10.17487\/RFC7816","DOI":"10.17487\/RFC7816"},{"key":"e_1_3_2_1_8_1","unstructured":"Cisco. May 13 2019. Umbrella Top 1M List. https:\/\/umbrella.cisco.com\/blog\/blog\/2016\/12\/14\/cisco-umbrella-1-million\/. Cisco. May 13 2019. Umbrella Top 1M List. https:\/\/umbrella.cisco.com\/blog\/blog\/2016\/12\/14\/cisco-umbrella-1-million\/."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"David Dittrich Erin Kenneally etal 2012. The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. US Department of Homeland Security (2012). David Dittrich Erin Kenneally et al. 2012. The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. US Department of Homeland Security (2012).","DOI":"10.2139\/ssrn.2445102"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Robert Elz Randy Bush Scott Bradner and Michael Patton. 1997. Selection and Operation of Secondary DNS Servers. RFC 2182 (Best Current Practice). https:\/\/doi.org\/10.17487\/RFC2182 Robert Elz Randy Bush Scott Bradner and Michael Patton. 1997. Selection and Operation of Secondary DNS Servers. RFC 2182 (Best Current Practice). https:\/\/doi.org\/10.17487\/RFC2182","DOI":"10.17487\/rfc2182"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278564"},{"volume-title":"Proceedings of the Traffic Monitoring and Analysis Workshop","year":"2016","author":"Gasser Oliver","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","unstructured":"Jeremy Kepner Kenjiro Cho and KC Claffy. 2019. New Phenomena in Large-Scale Internet Traffic. arXiv:cs.NI\/1904.04396 Jeremy Kepner Kenjiro Cho and KC Claffy. 2019. New Phenomena in Large-Scale Internet Traffic. arXiv:cs.NI\/1904.04396"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.07.009"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23386"},{"key":"e_1_3_2_1_16_1","unstructured":"Victor Le Pochat Tom Van Goethem Samaneh Tajalizadehkhoob Maciej Korczy\u0144ski and Wouter Joosen. May 13 2019. Tranco List. https:\/\/tranco-list.eu\/. Victor Le Pochat Tom Van Goethem Samaneh Tajalizadehkhoob Maciej Korczy\u0144ski and Wouter Joosen. May 13 2019. Tranco List. https:\/\/tranco-list.eu\/."},{"key":"e_1_3_2_1_17_1","unstructured":"Majestic. May 13 2019. The Majestic Million. https:\/\/majestic.com\/reports\/majestic-million\/. Majestic. May 13 2019. The Majestic Million. https:\/\/majestic.com\/reports\/majestic-million\/."},{"key":"e_1_3_2_1_18_1","unstructured":"University of Oregon. 2019. Route Views Project. http:\/\/www.routeviews.org University of Oregon. 2019. Route Views Project. http:\/\/www.routeviews.org"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Craig Partridge and Mark Allman. 2016. Ethical Considerations in Network Measurement Papers. Commun. ACM (2016). https:\/\/doi.org\/10.1145\/2896816 Craig Partridge and Mark Allman. 2016. Ethical Considerations in Network Measurement Papers. Commun. ACM (2016). https:\/\/doi.org\/10.1145\/2896816","DOI":"10.1145\/2896816"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15986-3_11"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278574"}],"event":{"name":"IMC '19: ACM Internet Measurement Conference","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Amsterdam Netherlands","acronym":"IMC '19"},"container-title":["Proceedings of the Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3355369.3355598","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T01:17:44Z","timestamp":1673486264000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3355369.3355598"}},"subtitle":["Gaining Insights with Prefixes from Domain-based Top Lists on DNS Deployment"],"short-title":[],"issued":{"date-parts":[[2019,10,21]]},"references-count":21,"alternative-id":["10.1145\/3355369.3355598","10.1145\/3355369"],"URL":"https:\/\/doi.org\/10.1145\/3355369.3355598","relation":{},"subject":[],"published":{"date-parts":[[2019,10,21]]},"assertion":[{"value":"2019-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}