{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T16:01:03Z","timestamp":1726761663446},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T00:00:00Z","timestamp":1571616000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1629973, CNS-1705050"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000180","name":"U.S. Department of Homeland Security","doi-asserted-by":"publisher","award":["AFRL-FA8750-18-2-0087"],"id":[{"id":"10.13039\/100000180","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,21]]},"DOI":"10.1145\/3355369.3355571","type":"proceedings-article","created":{"date-parts":[[2019,10,18]],"date-time":"2019-10-18T12:57:15Z","timestamp":1571403435000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Measuring Security Practices and How They Impact Security"],"prefix":"10.1145","author":[{"given":"Louis F.","family":"DeKoven","sequence":"first","affiliation":[{"name":"University of California, San Diego"}]},{"given":"Audrey","family":"Randall","sequence":"additional","affiliation":[{"name":"University of California, San Diego"}]},{"given":"Ariana","family":"Mirian","sequence":"additional","affiliation":[{"name":"University of California, San Diego"}]},{"given":"Gautam","family":"Akiwate","sequence":"additional","affiliation":[{"name":"University of California, San Diego"}]},{"given":"Ansel","family":"Blume","sequence":"additional","affiliation":[{"name":"University of California, San Diego"}]},{"given":"Lawrence K.","family":"Saul","sequence":"additional","affiliation":[{"name":"University of California, San Diego"}]},{"given":"Aaron","family":"Schulman","sequence":"additional","affiliation":[{"name":"University of California, San Diego"}]},{"given":"Geoffrey M.","family":"Voelker","sequence":"additional","affiliation":[{"name":"University of California, San Diego"}]},{"given":"Stefan","family":"Savage","sequence":"additional","affiliation":[{"name":"University of California, San Diego"}]}],"member":"320","published-online":{"date-parts":[[2019,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Apache Software Foundation. 2019. Apache Hive Website. https:\/\/hive.apache.org\/. (2019). Apache Software Foundation. 2019. Apache Hive Website. https:\/\/hive.apache.org\/. (2019)."},{"key":"e_1_3_2_1_2_1","unstructured":"Apple. 2018. Update your iPhone iPad or iPod touch. https:\/\/support.apple.com\/en-us\/HT204204. (2018). Apple. 2018. Update your iPhone iPad or iPod touch. https:\/\/support.apple.com\/en-us\/HT204204. (2018)."},{"key":"e_1_3_2_1_3_1","unstructured":"Mihir Bellare and Phillip Rogaway. 2010. The FFX Mode of Operation for Format-Preserving Encryption. Manuscript (standards proposal) submitted to NIST (January 2010). Mihir Bellare and Phillip Rogaway. 2010. The FFX Mode of Operation for Format-Preserving Encryption. Manuscript (standards proposal) submitted to NIST (January 2010)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134022"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590347"},{"key":"e_1_3_2_1_6_1","volume-title":"Analysis of Computer Infection Risk Factors Based on Customer Network Usage. In 2008 Second International Conference on Emerging Security Information, Systems and Technologies","author":"Carlinet Yannick","year":"2008"},{"key":"e_1_3_2_1_7_1","unstructured":"Carrie Marshall and Cat Ellis. 2018. The best free password manager 2019. https:\/\/www.techradar.com\/news\/software\/applications\/the-best-password-manager-1325845. (2018). Carrie Marshall and Cat Ellis. 2018. The best free password manager 2019. https:\/\/www.techradar.com\/news\/software\/applications\/the-best-password-manager-1325845. (2018)."},{"key":"e_1_3_2_1_8_1","unstructured":"CVE Details. 2019. Mozilla Thunderbird Vulnerability Statistics. https:\/\/www.cvedetails.com\/product\/3678\/?q=Thunderbird. (2019). CVE Details. 2019. Mozilla Thunderbird Vulnerability Statistics. https:\/\/www.cvedetails.com\/product\/3678\/?q=Thunderbird. (2019)."},{"key":"e_1_3_2_1_9_1","unstructured":"DNSFilter. 2019. DNSFilter Website. https:\/\/www.dnsfilter.com\/. (2019). DNSFilter. 2019. DNSFilter Website. https:\/\/www.dnsfilter.com\/. (2019)."},{"key":"e_1_3_2_1_10_1","unstructured":"The Enigmail Project. 2019. Enigmail --- OpenPGP encryption for Thunderbird. https:\/\/www.enigmail.net\/index.php\/en\/home. (2019). The Enigmail Project. 2019. Enigmail --- OpenPGP encryption for Thunderbird. https:\/\/www.enigmail.net\/index.php\/en\/home. (2019)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241292"},{"key":"e_1_3_2_1_12_1","unstructured":"Firefox. 2019. How to stop Firefox from making automatic connections. https:\/\/support.mozilla.org\/en-US\/kb\/how-stop-firefox-making-automatic-connections. (2019). Firefox. 2019. How to stop Firefox from making automatic connections. https:\/\/support.mozilla.org\/en-US\/kb\/how-stop-firefox-making-automatic-connections. (2019)."},{"key":"e_1_3_2_1_13_1","volume-title":"Procedings of the 12th Symposium on Usable Privacy and Security (SOUPS)","author":"Forget Alain","year":"2016"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1987510.1987528"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium","author":"Gu Guofei","year":"2007"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Trevor Hastie Robert Tibshirani and Jerome Friedman. 2001. The Elements of Statistical Learning. Springer New York Inc. Trevor Hastie Robert Tibshirani and Jerome Friedman. 2001. The Elements of Statistical Learning. Springer New York Inc.","DOI":"10.1007\/978-0-387-21606-5"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1719030.1719050"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"David W Hosmer Jr and Stanley Lemeshow. 2000. Applied Logistic Regression (2nd ed.). John Wiley & Sons. David W Hosmer Jr and Stanley Lemeshow. 2000. Applied Logistic Regression (2nd ed.). John Wiley & Sons.","DOI":"10.1002\/0471722146"},{"key":"e_1_3_2_1_19_1","unstructured":"IAB. 2019. IAB Tech Lab Content Taxonomy. https:\/\/www.iab.com\/guidelines\/iab-tech-lab-content-taxonomy\/. (2019). IAB. 2019. IAB Tech Lab Content Taxonomy. https:\/\/www.iab.com\/guidelines\/iab-tech-lab-content-taxonomy\/. (2019)."},{"key":"e_1_3_2_1_20_1","unstructured":"Gareth James Daniela Witten Trevor Hastie and Robert Tibshirani. 2014. An Introduction to Statistical Learning: With Applications in R. Springer Publishing Company Incorporated. Gareth James Daniela Witten Trevor Hastie and Robert Tibshirani. 2014. An Introduction to Statistical Learning: With Applications in R. Springer Publishing Company Incorporated."},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of IEEE Military Communications Conference (MILCOM)","author":"Khan Moazzam"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516747"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the 24th USENIX Conference on Security Symposium","author":"Liu Yang","year":"2015"},{"key":"e_1_3_2_1_24_1","unstructured":"Microsoft. 2019. Microsoft Update Catalog. https:\/\/www.catalog.update.microsoft.com\/Home.aspx. (2019). Microsoft. 2019. Microsoft Update Catalog. https:\/\/www.catalog.update.microsoft.com\/Home.aspx. (2019)."},{"key":"e_1_3_2_1_25_1","unstructured":"Mozilla Foundation. 2019. Public Suffix List Website. https:\/\/publicsuffix.org\/. (2019). Mozilla Foundation. 2019. Public Suffix List Website. https:\/\/publicsuffix.org\/. (2019)."},{"key":"e_1_3_2_1_26_1","unstructured":"Neil J. Rubenking. 2019. The Best Antivirus Protectionfor2019. https:\/\/www.pcmag.com\/article2\/0 2817 2372364 00.asp. (2019). Neil J. Rubenking. 2019. The Best Antivirus Protectionfor2019. https:\/\/www.pcmag.com\/article2\/0 2817 2372364 00.asp. (2019)."},{"key":"e_1_3_2_1_27_1","unstructured":"ntop. 2018. PF_RING ZC (Zero Copy) Website. https:\/\/www.ntop.org\/products\/packet-capture\/pf_ring\/pf_ring-zc-zero-copy\/. (2018). ntop. 2018. PF_RING ZC (Zero Copy) Website. https:\/\/www.ntop.org\/products\/packet-capture\/pf_ring\/pf_ring-zc-zero-copy\/. (2018)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_1_30_1","unstructured":"ProofPoint. 2019. ET Pro Ruleset. https:\/\/www.proofpoint.com\/us\/threat-insight\/et-pro-ruleset. (2019). ProofPoint. 2019. ET Pro Ruleset. https:\/\/www.proofpoint.com\/us\/threat-insight\/et-pro-ruleset. (2019)."},{"key":"e_1_3_2_1_31_1","unstructured":"Redislabs. 2019. Redis Website. https:\/\/redis.io\/. (2019). Redislabs. 2019. Redis Website. https:\/\/redis.io\/. (2019)."},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","author":"Redmiles Elissa M."},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems","author":"Redmiles Elissa M."},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the 2019 IEEE Symposium on Security and Privacy","author":"Redmiles Elissa M."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.3681050"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54328-4_9"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025926"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243779"},{"key":"e_1_3_2_1_39_1","unstructured":"Suricata. 2019. Suricata IDS Website. https:\/\/suricata-ids.org\/. (2019). Suricata. 2019. Suricata IDS Website. https:\/\/suricata-ids.org\/. (2019)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133971"},{"key":"e_1_3_2_1_41_1","unstructured":"Update Google Chrome. 2019. Update Google Chrome. https:\/\/support.google.com\/chrome\/answer\/95414?co=GENIE.Platform%3DDesktop&hl=en. (2019). Update Google Chrome. 2019. Update Google Chrome. https:\/\/support.google.com\/chrome\/answer\/95414?co=GENIE.Platform%3DDesktop&hl=en. (2019)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08593-7_8"},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems","author":"Vitale Francesco"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837125"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/3235866.3235892"},{"key":"e_1_3_2_1_46_1","unstructured":"Webshrinker. 2018. IAB Categories. https:\/\/docs.webshrinker.com\/v3\/iab-website-categories.html#iab-categories. (2018). Webshrinker. 2018. IAB Categories. https:\/\/docs.webshrinker.com\/v3\/iab-website-categories.html#iab-categories. (2018)."},{"key":"e_1_3_2_1_47_1","unstructured":"Webshrinker. 2019. Webshrinker Website. https:\/\/www.webshrinker.com\/. (2019). Webshrinker. 2019. Webshrinker Website. https:\/\/www.webshrinker.com\/. (2019)."},{"key":"e_1_3_2_1_48_1","unstructured":"The Wireshark Team. 2019. Wireshark Website. https:\/\/www.wireshark.org\/. (2019). The Wireshark Team. 2019. Wireshark Website. https:\/\/www.wireshark.org\/. (2019)."},{"key":"e_1_3_2_1_49_1","volume-title":"Procedings of the 27th USENIX Security Symposium (USENIX Security)","author":"Xiao Chaowei","year":"2018"},{"key":"e_1_3_2_1_50_1","unstructured":"Zeek. 2019. Zeek Protocol Analyzers Website. https:\/\/docs.zeek.org\/en\/stable\/script-reference\/proto-analyzers.html. (2019). Zeek. 2019. Zeek Protocol Analyzers Website. https:\/\/docs.zeek.org\/en\/stable\/script-reference\/proto-analyzers.html. (2019)."}],"event":{"name":"IMC '19: ACM Internet Measurement Conference","location":"Amsterdam Netherlands","acronym":"IMC '19","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3355369.3355571","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3355369.3355571","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T01:07:14Z","timestamp":1673485634000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3355369.3355571"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,21]]},"references-count":50,"alternative-id":["10.1145\/3355369.3355571","10.1145\/3355369"],"URL":"https:\/\/doi.org\/10.1145\/3355369.3355571","relation":{},"subject":[],"published":{"date-parts":[[2019,10,21]]},"assertion":[{"value":"2019-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}