{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T05:28:17Z","timestamp":1725686897961},"reference-count":44,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.23919\/tma.2018.8506521","type":"proceedings-article","created":{"date-parts":[[2018,10,25]],"date-time":"2018-10-25T23:53:55Z","timestamp":1540511635000},"page":"1-8","source":"Crossref","is-referenced-by-count":7,"title":["Dmap: Automating Domain Name Ecosystem Measurements and Applications"],"prefix":"10.23919","author":[{"given":"Maarten","family":"Wullink","sequence":"first","affiliation":[]},{"given":"Giovane C. M.","family":"Moura","sequence":"additional","affiliation":[]},{"given":"Cristian","family":"Hesselman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2018","journal-title":"Alexa Keyword Research Competitive Analysis & website ranking","key":"ref39"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/JSAC.2016.2558918"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.14722\/ndss.2015.23053"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1145\/1028788.1028824"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.17487\/rfc5246"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.17487\/rfc5280"},{"year":"2015","author":"hesselman","journal-title":"Technical Report","article-title":"A privacy framework for DNS big data applications","key":"ref37"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1145\/2896816"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/NOMS.2016.7502925"},{"year":"2015","author":"kornacker","journal-title":"Proceedings of the Conference on Innovative Data Systems Research (CIDR)","article-title":"Impala: A modern, open-source SQL engine for Hadoop","key":"ref34"},{"year":"2018","author":"graham","journal-title":"Masscan TCP port scanner spews SYN packets asynchronously scanning entire Internet in under 5 minutes","key":"ref10"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1145\/2976749.2978313"},{"year":"2013","author":"durumeric","journal-title":"Proceedings of the 22nd USENIX Security Symposium","article-title":"Zmap: Fast internet-wide scanning and its security applications","key":"ref11"},{"year":"2017","journal-title":"ZMap The ZMap Project","key":"ref12"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/3133956.3133971"},{"year":"2018","journal-title":"DomainTools Threat Intelligence Threat Hunting Incident Response Whois DomainTools","key":"ref14"},{"year":"2018","journal-title":"CAIDA CAIDA Data - Overview of Datasets Monitors and Reports","key":"ref15"},{"year":"2018","journal-title":"ISI\/USC ANT Datasets","key":"ref16"},{"year":"2018","author":"team","journal-title":"Internet- Wide Scan Data Repository","key":"ref17"},{"year":"2018","journal-title":"Censys Security Driven by Data","key":"ref18"},{"year":"2018","journal-title":"ICANN Centralized Zone Data Service","key":"ref19"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.17487\/rfc6376"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.17487\/rfc1035"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.17487\/RFC7849"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.17487\/RFC7719"},{"year":"2000","author":"fielding","journal-title":"PhD thesis","article-title":"Architectural Styles and the Design of Network-based Software Architectures","key":"ref6"},{"year":"2018","journal-title":"Apache Apache HttpComponents","key":"ref29"},{"year":"2018","journal-title":"SIDN Labs Dmap","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.14778\/1920841.1920886"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/MCOM.2017.1600521CM"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/2987443.2987446"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/NOMS.2016.7502925"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.17487\/rfc1034"},{"year":"2018","journal-title":"Spring Spring Boot","key":"ref20"},{"year":"2017","journal-title":"Phantomjs phantomjs","key":"ref22"},{"year":"2018","journal-title":"Maxmind GeoIP2 City Database Demo","key":"ref21"},{"year":"0","journal-title":"Let's encrypt - free ssl\/tls certificates","key":"ref42"},{"year":"2018","journal-title":"Hazelcast Hazelcast IMDG - the leading In-memory Data Grid","key":"ref24"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.17487\/rfc3207"},{"year":"2018","journal-title":"PostgreSQL The world's most adavanced open source database","key":"ref23"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1109\/TDSC.2015.2427847"},{"year":"2003","author":"thomson","journal-title":"RFC 3596 DNS Extensions to Support IP Version 6","key":"ref26"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1145\/3106328.3106338"},{"year":"2015","author":"gormley","journal-title":"Elasticsearch The Definitive Guide","key":"ref25"}],"event":{"name":"2018 Network Traffic Measurement and Analysis Conference (TMA)","start":{"date-parts":[[2018,6,26]]},"location":"Vienna","end":{"date-parts":[[2018,6,29]]}},"container-title":["2018 Network Traffic Measurement and Analysis Conference (TMA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8488332\/8506485\/08506521.pdf?arnumber=8506521","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T17:03:38Z","timestamp":1643216618000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8506521\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":44,"URL":"https:\/\/doi.org\/10.23919\/tma.2018.8506521","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}