{"@context":{"@vocab":"https://cir.nii.ac.jp/schema/1.0/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/","foaf":"http://xmlns.com/foaf/0.1/","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","datacite":"https://schema.datacite.org/meta/kernel-4/","ndl":"http://ndl.go.jp/dcndl/terms/","jpcoar":"https://github.com/JPCOAR/schema/blob/master/2.0/"},"@id":"https://cir.nii.ac.jp/crid/1520009408525397888.json","@type":"Article","productIdentifier":[{"identifier":{"@type":"NDL_BIB_ID","@value":"025411011"}},{"identifier":{"@type":"URI","@value":"http://id.ndl.go.jp/bib/025411011"}},{"identifier":{"@type":"URI","@value":"https://ndlsearch.ndl.go.jp/books/R000000004-I025411011"}},{"identifier":{"@type":"NAID","@value":"110009861002"}}],"dc:title":[{"@value":"DNS Traffic Analysis Platform with Hadoop Framework"}],"dcterms:alternative":[{"@value":"DNS Traffic Analysis Platform with Hadoop Framework"},{"@value":"Hadoopを利用したDNSトラヒックのセキュリティ解析をおこなう基盤についての一検討"},{"@language":"ja-Kana","@value":"Hadoop オ リヨウ シタ DNS トラヒック ノ セキュリティ カイセキ オ オコナウ キバン ニ ツイテ ノ イチ ケントウ"},{"@value":"情報通信システムセキュリティ"},{"@language":"ja-Kana","@value":"ジョウホウ ツウシン システム セキュリティ"}],"dc:language":"en","creator":[{"@id":"https://cir.nii.ac.jp/crid/1420564276187538048","@type":"Researcher","personIdentifier":[{"@type":"KAKEN_RESEARCHERS","@value":"60588242"},{"@type":"NRID","@value":"1000060588242"},{"@type":"NRID","@value":"9000004773691"},{"@type":"NRID","@value":"9000004344114"},{"@type":"NRID","@value":"9000404310835"},{"@type":"NRID","@value":"9000017707828"},{"@type":"NRID","@value":"9000340442974"},{"@type":"NRID","@value":"9000004858322"},{"@type":"NRID","@value":"9000290550484"},{"@type":"NRID","@value":"9000004865568"},{"@type":"NRID","@value":"9000404307428"},{"@type":"RESEARCHMAP","@value":"https://researchmap.jp/sho_red"}],"foaf:name":[{"@value":"石原 知洋"}]},{"@id":"https://cir.nii.ac.jp/crid/1583387452652664960","@type":"Researcher","personIdentifier":[{"@type":"NRID","@value":"9000272642656"}],"foaf:name":[{"@value":"田崎 創"}]},{"@id":"https://cir.nii.ac.jp/crid/1583387452652664961","@type":"Researcher","personIdentifier":[{"@type":"NRID","@value":"9000272642671"}],"foaf:name":[{"@value":"岡田 和也"}]}],"publication":{"publicationIdentifier":[{"@type":"NDL_BIB_ID","@value":"000000050569"},{"@type":"ISSN","@value":"09135685"},{"@type":"LISSN","@value":"09135685"},{"@type":"NCID","@value":"AA1123312X"}],"prism:publicationName":[{"@value":"電子情報通信学会技術研究報告 = IEICE technical report : 信学技報"}],"dc:publisher":[{"@value":"東京 : 電子情報通信学会"}],"prism:publicationDate":"2014-03","prism:volume":"113","prism:number":"502","prism:startingPage":"131","prism:endingPage":"135"},"url":[{"@id":"http://id.ndl.go.jp/bib/025411011"},{"@id":"https://ndlsearch.ndl.go.jp/books/R000000004-I025411011"}],"foaf:topic":[{"@id":"https://cir.nii.ac.jp/all?q=DNS","dc:title":"DNS"},{"@id":"https://cir.nii.ac.jp/all?q=Hadoop","dc:title":"Hadoop"},{"@id":"https://cir.nii.ac.jp/all?q=Botnet","dc:title":"Botnet"},{"@id":"https://cir.nii.ac.jp/all?q=Malware","dc:title":"Malware"},{"@id":"https://cir.nii.ac.jp/all?q=Security","dc:title":"Security"}],"dataSourceIdentifier":[{"@type":"NDL_SEARCH","@value":"oai:ndlsearch.ndl.go.jp:R000000004-I025411011"},{"@type":"CIA","@value":"110009861002"}]}