{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“邮件”:{“索引”:{“日期-部件”:[[2022,11,7]],“日期-时间”:“2022-11-07T15:13:25Z”,“时间戳”:1667834005182},“引用-计数”:26,“发布者”:“IEEE”,“许可证”:[{“开始”:{'日期-部件“:[2020,6,1]],”日期-时间“:”2020-06-01T00:00:00Z“,”timestamp“:1590969600000},”content-version“:”vor“,“delay-in-days”:0,“URL”:“https:\/\/ieeexplore.iee.org\/Xplorehelp\/downloads\/license-information\/ieee.html”},{“start”:{“date-parts”:[[2020,6,1]],“date-time”:“2020-06-01T00:00:00Z”,“timestamp”:1590969600000},“content-version”:“stm-asf”,“delay-in-days“:0,”URL“https:\\/doi.org\/10.1 5223\/policy-029“},{“开始”:{“日期部分”:[[2020,6,1]],“date-time”:“2020-06-01T00:00:00Z”,“timestamp”:1590969600000},“content-version”:“stm-asf”,“delay-in-days”:0,“URL”:“https:\\/doi.org\/10.15223\/policy-037”}],“content-domain”:{“domain”:[],“crossmark-restriction”:false},”short-container-title“:[],”published-print“:{”date-parts“:[2020,6]},“doi”:“10.1109\/cns48642.2020.9162303”,“类型”:“procesdings-article”,“created”:{“date-parts”:[[2020,8,7]],“date-time”:“2020-08-07T21:54:40Z”,“timestamp”:1596837280000},“source”:“Crossref”,“is-referenced-by-count”:2,“title”:[“云服务滥用的大规模分析”],“prefix”:“10.1109”,”author“:[{”given“give”:“Naoki”,“family”:“Fukushi”,《sequence》:“first”,“affiliation”:[]},{“给定”:“Daiki”,“family”:“千叶”,“sequence”:“additional”,“affiliation”:[]},{“given”:“Mitsuaki”,“failment”:“Akiyama”,“序列”:“附加”,“从属关系”:[]},}“giving”:“Masato”,“家族”:“Uchida”,“顺序”:“额外”,“隶属关系”:[]}],“成员”:“263”,“引用”:[{“key”:”ref10“,“year”:“0”,“journal-title”:“IP地址范围“},{”key“:”ref11“,”doi-asserted-by“:“publisher”,“DOI”:“10.1145\/1315245.1315288”},{“key”:“ref12”,“DOI-asserted-by”:“publicher”,“DOI”:”10.1145\/2808128.2808129“},}“key:”ref13“,”first page“:”851“,”article-title“阅读茶叶:威胁情报的比较分析”,“author”:“li”,“year”:“2019”,“journal-title”:“Proc Usenix Security”}、{“密钥”:“”参考14“,”年份“:”0“,“journal-title”:“All cybercrime IP feeds”},{“key”:“ref15”,“year”:“0”,“johnal-title:“明智选择您的AWS地区,为您节省大量痛苦(和金钱)”},“年份”:“0”,“journal-title”:“The UCSD Network Telescope”},{“key”:“ref19”,“year”:“0”,“johnal-title:“IPVoid”}:“ref6”,“year”:“0”,“journal-title”:“Barracuda blocking email from SES”},{“key”:“ref5”,“年份”:“O”,“日记标题”:“RightScale 2019年Flexera的云状态报告”}:“参考2”,“year”:“0”,“journal-title”:“任何Instagram帐户如何在不到10分钟的时间内被黑客攻击”},{“key”:“ref9”,“year:”0“,”journal-title“:”Google compute engine FAQ“},}”key“:”ref1“,”year“:”0:“10.1145\/1159913.1159947”},{“key”:“ref22”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/SP.2019.00011”}“ref23”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/2976749.2978387”},{“key”:“ref26”,“doi-asserted-by”:“publisher”,“doi”:“10.2197\/ipsjjip.27.525”},{“key”:“ref25”,“first page”:”147“,“article-title”:“Don not throw me away:安卓应用程序使用的废弃互联网资源造成的威胁”,“author”:“pariwono”,“year”:“2018”,“journal-title“:”Proc ACM ASIACCS“}],“event”:{“name”:“2020年IEEE通信和网络安全会议(CNS)”,“地点”:“法国阿维尼翁”,“开始”:{“日期部分”:[[2020,6,29]]},“结束”:{“日期部分“:[[2020,7,1]]}},”容器标签“:[”2020 IEEE通信与网络安全会议“],“原始标题”:[],“链接”:[{“URL”:“http://\/xplorestaging.ieee.org\/ielx7\/9153729\/9162157\/09162303.pdf?arnumber=9162303”,“content-type”:“unspecified”,“content-version”:“vor”,“intended-application”:“similarity-checking”}],“deposed”:{“date-parts”:[2022,6,27]],“date-time”:”2022-06-27T15:58:42Z“,“timestamp”:1656345522000},“score”:1,“资源“:{“主”:{”URL“:“https:\/\/ieeexplore.iee.org\/document\/9162303\/”}},“副标题”:[],“短标题”:[],“已发布”:{“日期-部件”:[[2020,6]]},”引用计数“:26,”URL“:”http://\/dx.doi.org\/10.109\/cns48642.2020.9162303“,”关系“:{},}}}