{"id":"https://openalex.org/W2288294290","doi":"https://doi.org/10.1007/978-3-319-28865-9_19","title":"You Are How You Query: Deriving Behavioral Fingerprints from DNS Traffic","display_name":"You Are How You Query: Deriving Behavioral Fingerprints from DNS Traffic","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2288294290","doi":"https://doi.org/10.1007/978-3-319-28865-9_19","mag":"2288294290"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-28865-9_19","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-28865-9_19","pdf_url":null,"source":{"id":"https://openalex.org/S4393917809","display_name":"Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","issn_l":"1867-8211","issn":["1867-8211","1867-822X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","raw_type":"book-chapter"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://corescholar.libraries.wright.edu/cse/537","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003571699","display_name":"Dae San Kim","orcid":"https://orcid.org/0000-0001-9599-7015"},"institutions":[{"id":"https://openalex.org/I19648265","display_name":"Wright State University","ror":"https://ror.org/04qk6pt94","country_code":"US","type":"education","lineage":["https://openalex.org/I19648265"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Dae Wook Kim","raw_affiliation_strings":["Wright State University, Dayton, USA","Wright State University, Dayton, United States"],"affiliations":[{"raw_affiliation_string":"Wright State University, Dayton, USA","institution_ids":["https://openalex.org/I19648265"]},{"raw_affiliation_string":"Wright State University, Dayton, United States","institution_ids":["https://openalex.org/I19648265"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100343070","display_name":"Junjie Zhang","orcid":"https://orcid.org/0000-0003-0061-3790"},"institutions":[{"id":"https://openalex.org/I19648265","display_name":"Wright State University","ror":"https://ror.org/04qk6pt94","country_code":"US","type":"education","lineage":["https://openalex.org/I19648265"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Junjie Zhang","raw_affiliation_strings":["Wright State University, Dayton, USA","Wright State University, Dayton, United States"],"affiliations":[{"raw_affiliation_string":"Wright State University, Dayton, USA","institution_ids":["https://openalex.org/I19648265"]},{"raw_affiliation_string":"Wright State University, Dayton, United States","institution_ids":["https://openalex.org/I19648265"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5003571699"],"corresponding_institution_ids":["https://openalex.org/I19648265"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10770039,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"348","last_page":"366"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9782999753952026,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/domain-name-system","display_name":"Domain Name System","score":0.8187434077262878},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7437373399734497},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.5104788541793823},{"id":"https://openalex.org/keywords/domain-name","display_name":"Domain name","score":0.4630221724510193},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.45300188660621643},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43971773982048035},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3969193696975708},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2293790876865387},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.18516013026237488}],"concepts":[{"id":"https://openalex.org/C35026560","wikidata":"https://www.wikidata.org/wiki/Q8767","display_name":"Domain Name System","level":3,"score":0.8187434077262878},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7437373399734497},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.5104788541793823},{"id":"https://openalex.org/C2988987868","wikidata":"https://www.wikidata.org/wiki/Q32635","display_name":"Domain name","level":3,"score":0.4630221724510193},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.45300188660621643},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43971773982048035},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3969193696975708},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2293790876865387},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.18516013026237488}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/978-3-319-28865-9_19","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-28865-9_19","pdf_url":null,"source":{"id":"https://openalex.org/S4393917809","display_name":"Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","issn_l":"1867-8211","issn":["1867-8211","1867-822X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","raw_type":"book-chapter"},{"id":"pmh:oai:corescholar.libraries.wright.edu:cse-1537","is_oa":true,"landing_page_url":"https://corescholar.libraries.wright.edu/cse/537","pdf_url":null,"source":{"id":"https://openalex.org/S2737205702","display_name":"Journal of Bioresource Management","issn_l":"2309-3854","issn":["2309-3854"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310316536","host_organization_name":"Bioresource Research Center (BRC), Islamabad","host_organization_lineage":["https://openalex.org/P4310316536"],"host_organization_lineage_names":["Bioresource Research Center (BRC), Islamabad"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computer Science and Engineering Faculty Publications","raw_type":"text"},{"id":"pmh:oai:works.bepress.com:junjie_zhang-1053","is_oa":true,"landing_page_url":"https://works.bepress.com/junjie_zhang/29","pdf_url":null,"source":{"id":"https://openalex.org/S2737205702","display_name":"Journal of Bioresource Management","issn_l":"2309-3854","issn":["2309-3854"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310316536","host_organization_name":"Bioresource Research Center (BRC), Islamabad","host_organization_lineage":["https://openalex.org/P4310316536"],"host_organization_lineage_names":["Bioresource Research Center (BRC), Islamabad"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Junjie Zhang","raw_type":"text"},{"id":"mag:2288294290","is_oa":false,"landing_page_url":"https://eudl.eu/pdf/10.1007/978-3-319-28865-9_19","pdf_url":null,"source":{"id":"https://openalex.org/S4306420833","display_name":"Security and Privacy in Communication Networks","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"Security and Privacy in Communication Networks","raw_type":null}],"best_oa_location":{"id":"pmh:oai:corescholar.libraries.wright.edu:cse-1537","is_oa":true,"landing_page_url":"https://corescholar.libraries.wright.edu/cse/537","pdf_url":null,"source":{"id":"https://openalex.org/S2737205702","display_name":"Journal of Bioresource Management","issn_l":"2309-3854","issn":["2309-3854"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310316536","host_organization_name":"Bioresource Research Center (BRC), Islamabad","host_organization_lineage":["https://openalex.org/P4310316536"],"host_organization_lineage_names":["Bioresource Research Center (BRC), Islamabad"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computer Science and Engineering Faculty Publications","raw_type":"text"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6200000047683716,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1986085123","https://openalex.org/W2048702750","https://openalex.org/W2108362714","https://openalex.org/W2128248711","https://openalex.org/W2135088779","https://openalex.org/W2143445293","https://openalex.org/W2144411949","https://openalex.org/W2153863240","https://openalex.org/W2159675343","https://openalex.org/W2165071399","https://openalex.org/W2167266744","https://openalex.org/W2169659938","https://openalex.org/W2173213060"],"related_works":["https://openalex.org/W2296738880","https://openalex.org/W3135148038","https://openalex.org/W2914882556","https://openalex.org/W2511064368","https://openalex.org/W3024918457","https://openalex.org/W2960131357","https://openalex.org/W2136945121","https://openalex.org/W3093988760","https://openalex.org/W2941007097","https://openalex.org/W2058463040","https://openalex.org/W2158204917","https://openalex.org/W2506066520","https://openalex.org/W134004636","https://openalex.org/W2110466131","https://openalex.org/W2507338601","https://openalex.org/W2913445384","https://openalex.org/W3088627260","https://openalex.org/W2069596317","https://openalex.org/W3152711633","https://openalex.org/W1988942367"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
