{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:22:19Z","timestamp":1759332139239,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319155081"},{"type":"electronic","value":"9783319155098"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-15509-8_3","type":"book-chapter","created":{"date-parts":[[2015,3,3]],"date-time":"2015-03-03T07:09:05Z","timestamp":1425366545000},"page":"28-40","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Measuring BGP Route Origin Registration and Validation"],"prefix":"10.1007","author":[{"given":"Daniele","family":"Iamartino","sequence":"first","affiliation":[]},{"given":"Cristel","family":"Pelsser","sequence":"additional","affiliation":[]},{"given":"Randy","family":"Bush","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,4]]},"reference":[{"key":"3_CR1","unstructured":"IPv4 Address Space in ROAs (\/24s). http:\/\/certification-stats.ripe.net\/?type=roa-v4"},{"key":"3_CR2","unstructured":"IPv4 Prefixes Delegated by AfriNIC. ftp:\/\/ftp.afrinic.net\/stats\/afrinic\/delegated-afrinic-extended-latest"},{"key":"3_CR3","unstructured":"IPv4 Prefixes Delegated by APNIC. ftp:\/\/ftp.apnic.net\/pub\/apnic\/stats\/apnic\/delegated-apnic-extended-latest"},{"key":"3_CR4","unstructured":"IPv4 Prefixes Delegated by ARIN. ftp:\/\/ftp.arin.net\/pub\/stats\/arin\/delegated-arin-extended-latest"},{"key":"3_CR5","unstructured":"IPv4 Prefixes Delegated by LACNIC. ftp:\/\/ftp.lacnic.net\/pub\/stats\/lacnic\/delegated-lacnic-extended-latest"},{"key":"3_CR6","unstructured":"IPv4 Prefixes Delegated by RIPE NCC. ftp:\/\/ftp.ripe.net\/ripe\/stats\/delegated-ripencc-extended-latest"},{"key":"3_CR7","unstructured":"rcynic RPKI validator. http:\/\/rpki.net\/wiki\/doc\/RPKI\/RP\/rcynic"},{"key":"3_CR8","unstructured":"University of oregon route views project. http:\/\/www.routeviews.org"},{"key":"3_CR9","unstructured":"YouTube Hijacking: A RIPE NCC RIS case study, March 2008. http:\/\/www.ripe.net\/internet-coordination\/news\/industry-developments\/youtube-hijacking-a-ripe-ncc-ris-case-study"},{"key":"3_CR10","unstructured":"Fincham, M.: RPKI, NZNOG 2014, February 2014. http:\/\/hotplate.co.nz\/archive\/nznog\/2014\/rpki\/"},{"key":"3_CR11","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1016\/j.comnet.2014.05.007","volume":"70","author":"S Goldberg","year":"2014","unstructured":"Goldberg, S., Shapira, M., Hummon, P., Rexford, J.: How secure are secure interdomain routing protocols? Comput. Netw. 70, 260\u2013287 (2014)","journal-title":"Comput. Netw."},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Heilman, E., Cooper, D., Reyzin, L., Goldberg, S.: From the consent of the routed: improving the transparency of the RPKI. In: Sigcomm 2014 (2014)","DOI":"10.1145\/2619239.2626293"},{"key":"3_CR13","unstructured":"Kloots, J.: RPKI Routing Policy Decision-Making, A SURFNET Perspective, February 2014. https:\/\/blog.surfnet.nl\/?p=3159"},{"key":"3_CR14","unstructured":"Lad, M., Massey, D., Pei, D., Wu, Y., Zhang, B., Zhang, L.: PHAS: a prefix hijack alert system. In: Proceedings of USENIX Security Symposium (2006)"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Lepinski, M., Kent, S.: An Infrastructure to Support Secure Internet Routing, RFC 6480, February 2012","DOI":"10.17487\/rfc6480"},{"key":"3_CR16","unstructured":"Litke, P., Stewart, J.: BGP Hijacking for Cryptocurrency Profit, August 2014. http:\/\/www.secureworks.com\/cyber-threat-intelligence\/threats\/bgp-hijacking-for-cryptocurrency-profit\/"},{"key":"3_CR17","unstructured":"Toonk, A.: Hijack Event Today by Indosat, April 2014. http:\/\/www.bgpmon.net\/hijack-event-today-by-indosat\/"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"W\u00e4hlisch, M., Maennel, O., Schmidt, T.C.: Towards detecting BGP route hijacking using the RPKI. In: Sigcomm 2012 (Poster) (2012)","DOI":"10.1145\/2342356.2342381"},{"key":"3_CR19","unstructured":"Zmijewski, E.: Indonesia Hijacks the World, April 2014. http:\/\/www.renesys.com\/2014\/04\/indonesia-hijacks-world\/"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-15509-8_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T02:24:59Z","timestamp":1675131899000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-15509-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319155081","9783319155098"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-15509-8_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"4 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}