{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T08:49:53Z","timestamp":1742978993960,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030578800"},{"type":"electronic","value":"9783030578817"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-57881-7_47","type":"book-chapter","created":{"date-parts":[[2020,8,31]],"date-time":"2020-08-31T14:04:16Z","timestamp":1598882656000},"page":"534-544","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Network Topology Boundary Routing IP Identification for IP Geolocation"],"prefix":"10.1007","author":[{"given":"Fuxiang","family":"Yuan","sequence":"first","affiliation":[]},{"given":"Fenlin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Rui","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xiangyang","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,1]]},"reference":[{"key":"47_CR1","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.comnet.2018.01.011","volume":"132","author":"AY Nur","year":"2018","unstructured":"Nur, A.Y., Tozal, M.E.: Cross-AS (X-AS) internet topology mapping. Comput. Netw. 132, 53\u201367 (2018)","journal-title":"Comput. Netw."},{"issue":"1","key":"47_CR2","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/MWC.2017.1600193WC","volume":"24","author":"J Huang","year":"2017","unstructured":"Huang, J., Duan, Q., Xing, C.C.: Topology control for building a large-scale and energy-efficient internet of things. IEEE Wirel. Commun. 24(1), 67\u201373 (2017)","journal-title":"IEEE Wirel. Commun."},{"issue":"3","key":"47_CR3","doi-asserted-by":"publisher","first-page":"955","DOI":"10.32604\/cmc.2019.05769","volume":"59","author":"X Li","year":"2019","unstructured":"Li, X., Xi, J., Cai, Z.: Analyzing the structure and connectivity of continent-level internet topology. Comput. Mater. Continua 59(3), 955\u2013964 (2019)","journal-title":"Comput. Mater. Continua"},{"issue":"1","key":"47_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-018-0018-3","volume":"2","author":"Z Wang","year":"2019","unstructured":"Wang, Z., Li, H., Li, Q.: Towards IP geolocation with intermediate routers based on topology discovery. Cybersecurity 2(1), 1\u201313 (2019)","journal-title":"Cybersecurity"},{"key":"47_CR5","doi-asserted-by":"publisher","first-page":"28340","DOI":"10.1109\/ACCESS.2019.2902337","volume":"7","author":"F Yuan","year":"2019","unstructured":"Yuan, F., Liu, F., Huang, D.: A high completeness PoP partition algorithm for IP geolocation. IEEE Access 7, 28340\u201328355 (2019)","journal-title":"IEEE Access"},{"key":"47_CR6","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/j.comnet.2015.02.012","volume":"81","author":"H Kardes","year":"2015","unstructured":"Kardes, H., Gunes, M.H., Sarac, K.: Graph based induction of unresponsive routers in internet topologies. Comput. Netw. 81, 178\u2013200 (2015)","journal-title":"Comput. Netw."},{"issue":"1","key":"47_CR7","doi-asserted-by":"publisher","first-page":"81","DOI":"10.32604\/cmc.2019.06288","volume":"61","author":"B Afzal","year":"2019","unstructured":"Afzal, B., Anwar, G., Muhammad, A.Q.: Smart security framework for educational institutions using internet of things (IoT). Comput. Mater. Continua 61(1), 81\u2013101 (2019)","journal-title":"Comput. Mater. Continua"},{"key":"47_CR8","unstructured":"Yong, W., Daniel, B., Marcel, F.: Towards street-level client-independent IP geolocation. In: 8th USENIX Symposium on Networked Systems Design and Implementation, Boston, USA, pp. 365\u2013379. USENIX (2011)"},{"issue":"7","key":"47_CR9","first-page":"2097","volume":"19","author":"J Chen","year":"2018","unstructured":"Chen, J., Liu, F., Shi, Y.: Towards IP location estimation using the nearest common router. J. Internet Technol. 19(7), 2097\u20132110 (2018)","journal-title":"J. Internet Technol."},{"key":"47_CR10","doi-asserted-by":"publisher","first-page":"59237","DOI":"10.1109\/ACCESS.2019.2914972","volume":"7","author":"F Zhao","year":"2019","unstructured":"Zhao, F., Xu, R., Li, R.: Street-level geolocation based on router multilevel partitioning. IEEE Access 7, 59237\u201359248 (2019)","journal-title":"IEEE Access"},{"key":"47_CR11","doi-asserted-by":"crossref","unstructured":"Liu, S., Liu, F., Zhao, F.: IP city-level geolocation based on the pop-level network topology analysis. In: 6th International Conference on Information Communication and Management, Hatfield, UK, pp. 109\u2013114. IEEE (2016)","DOI":"10.1109\/INFOCOMAN.2016.7784225"},{"key":"47_CR12","doi-asserted-by":"crossref","unstructured":"Zhao, F., Luo, X., Gan, Y.: IP geolocation based on identification routers and local delay distribution similarity. Concurr. Comput. Pract. Exp. 31 e4722 (2018)","DOI":"10.1002\/cpe.4722"},{"key":"47_CR13","doi-asserted-by":"crossref","unstructured":"Luckie, M., Dhamdhere, A., Huffaker, B.: Bdrmap: inference of borders between IP networks. In: the 2016 Internet Measurement Conference, Santa Monica, California, USA, pp. 381\u2013396. ACM (2016)","DOI":"10.1145\/2987443.2987467"},{"key":"47_CR14","doi-asserted-by":"crossref","unstructured":"Marder, A., Smith, J. M.: MAP-IT: multipass accurate passive inferences from traceroute. In: the 2016 Internet Measurement Conference, Santa Monica, California, USA, pp. 397\u2013411. ACM (2016)","DOI":"10.1145\/2987443.2987468"},{"issue":"2\u20134","key":"47_CR15","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/s40012-016-0110-3","volume":"4","author":"SBM Baskaran","year":"2016","unstructured":"Baskaran, S.B.M., Raja, G.: Blind key distribution mechanism to secure wireless metropolitan area network. CSI Trans. ICT 4(2\u20134), 157\u2013163 (2016)","journal-title":"CSI Trans. ICT"},{"issue":"1","key":"47_CR16","doi-asserted-by":"publisher","first-page":"32","DOI":"10.3390\/s19010032","volume":"19","author":"F Zeng","year":"2019","unstructured":"Zeng, F., Ren, Y., Deng, X.: Cost-effective edge server placement in wireless metropolitan area networks. Sensors 19(1), 32 (2019)","journal-title":"Sensors"},{"key":"47_CR17","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1016\/j.comnet.2018.02.006","volume":"135","author":"G Ciavarrini","year":"2018","unstructured":"Ciavarrini, G., Greco, M.S., Vecchio, A.: Geolocation of internet hosts: accuracy limits through Cram\u00e9r-Rao lower bound. Comput. Netw. 135, 70\u201380 (2018)","journal-title":"Comput. Netw."},{"issue":"2","key":"47_CR18","first-page":"232","volume":"15","author":"S Qazi","year":"2018","unstructured":"Qazi, S., Kadri, M.B.: Revisiting constraint based geolocation: improving accuracy through removal of outliers. Int. Arab J. Inf. Technol. 15(2), 232\u2013239 (2018)","journal-title":"Int. Arab J. Inf. Technol."},{"issue":"1","key":"47_CR19","doi-asserted-by":"publisher","first-page":"157","DOI":"10.14257\/ijfgcn.2016.9.1.15","volume":"9","author":"N Khanna","year":"2016","unstructured":"Khanna, N.: Mitigation of collaborative blackhole attack using traceroute mechanism with enhancement in AODV routing protocol. Int. J. Future Gener. Commun. Netw. 9(1), 157\u2013166 (2016)","journal-title":"Int. J. Future Gener. Commun. Netw."},{"issue":"3","key":"47_CR20","doi-asserted-by":"publisher","first-page":"959","DOI":"10.32604\/cmc.2019.07580","volume":"60","author":"M Belghachi","year":"2019","unstructured":"Belghachi, M., Debab, N.: An efficient greedy traffic aware routing scheme for internet of vehicles. Comput. Mater. Continua 60(3), 959\u2013972 (2019)","journal-title":"Comput. Mater. Continua"},{"key":"47_CR21","doi-asserted-by":"crossref","unstructured":"Fontugne, R., Pelsser, C., Aben, E.: Pinpointing delay and forwarding anomalies using large-scale traceroute measurements. In: The 2017 Internet Measurement Conference, London, UK, pp. 15\u201328. ACM (2017)","DOI":"10.1145\/3131365.3131384"},{"issue":"1","key":"47_CR22","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/s00607-013-0290-8","volume":"96","author":"ER Gansner","year":"2014","unstructured":"Gansner, E.R., Krishnamurthy, B., Willinger, W.: Demo abstract: towards extracting semantics by visualizing large traceroute datasets. Computing 96(1), 81\u201383 (2014)","journal-title":"Computing"},{"key":"47_CR23","doi-asserted-by":"crossref","unstructured":"Guo, C., Liu, Y., Shen, W.: Mining the web and the internet for accurate IP address geolocations. In: International Conference on Computer Communications, Rio de Janeiro, Brazil, pp. 2841\u20132845. IEEE (2009)","DOI":"10.1109\/INFCOM.2009.5062243"},{"key":"47_CR24","doi-asserted-by":"crossref","unstructured":"Zhu, G., Luo, X., Liu, F.: An algorithm of city-level landmark mining based on internet forum. In: 18th International Conference on Network-Based Information Systems, Taipei, Taiwan, CN, pp. 294\u2013301. IEEE (2015)","DOI":"10.1109\/NBiS.2015.46"},{"issue":"5","key":"47_CR25","first-page":"1415","volume":"20","author":"T Ma","year":"2019","unstructured":"Ma, T., Liu, F., Luo, X.: An algorithm of street-level landmark obtaining based on yellow pages. J. Internet Technol. 20(5), 1415\u20131428 (2019)","journal-title":"J. Internet Technol."},{"key":"47_CR26","unstructured":"Jiang, H., Liu, Y., Matthews, J. N.: IP Geolocation estimation using neural networks with stable landmarks. In: International Conference on Computer Communications, San Francisco, CA, USA, pp. 170\u2013175. IEEE (2016)"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57881-7_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,31]],"date-time":"2020-08-31T14:36:18Z","timestamp":1598884578000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-57881-7_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030578800","9783030578817"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57881-7_47","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hohhot","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}