{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T12:04:25Z","timestamp":1746273865251,"version":"3.40.3"},"publisher-location":"Wiesbaden","reference-count":22,"publisher":"Springer Fachmedien Wiesbaden","isbn-type":[{"type":"print","value":"9783658067076"},{"type":"electronic","value":"9783658067083"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-658-06708-3_12","type":"book-chapter","created":{"date-parts":[[2014,10,17]],"date-time":"2014-10-17T06:50:27Z","timestamp":1413528627000},"page":"155-169","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Secure Communication and Digital Sovereignty in Europe"],"prefix":"10.1007","author":[{"given":"Norbert","family":"Pohlmann","sequence":"first","affiliation":[]},{"given":"Michael","family":"Sparenberg","sequence":"additional","affiliation":[]},{"given":"Illya","family":"Siromaschenko","sequence":"additional","affiliation":[]},{"given":"Kilian","family":"Kilden","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,18]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"[FPSW12] Feld, Pohlmann, Sparenberg, Wichmann:Analyzing G-20\u2019s key autonomous systems and their intermeshing using AS-Analyzer. In: ISSE 2012 Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2012 Conference, Springer Vieweg, 2012.","DOI":"10.1007\/978-3-658-00333-3_22"},{"key":"12_CR2","unstructured":"[CaRe05] Matthew Caesar, Jennifer Rexford: \u201cBGP routing policies in ISP networks \u201d, 2005 http:\/\/www.cs.princeton.edu\/~jrex\/papers\/policies.pdf Last access: 22.07.2014"},{"key":"12_CR3","unstructured":"[KaFR09] Josh Karlin, Stephanie Forrest, and Jennifer Rexford : \u201cNation-State Routing: Censorship, Wiretapping, and BGP \u201d, 2009 http:\/\/arxiv.org\/pdf\/0903.3218v1.pdf Last access: 22.07.2014"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"[FPS+02] Joan Feigenbaum, Christos Papadimitriou, Rahul Sami, Scott Shenker: \u201cA BGP-based Mechanism for Lowest-Cost Routing\u201d, 2002 http:\/\/www.cs.yale.edu\/homes\/jf\/PODC02.pdf Last access: 22.07.2014","DOI":"10.1145\/571825.571856"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"[MuFe06] Wolfgang M\u00fchlbauer , Anja Feldmann, Olaf Maennel , Matthew Roughan, Steve Uhlig \u201eBuilding an AS-Topology Model that Captures Route Diversity\u201c, 2006 http:\/\/dl.acm.org\/ft_gateway.cfm?id=1159937 Last access: 22.07.2014","DOI":"10.1145\/1159913.1159937"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"[YoJB02] Soon-Hyung Yook, Hawoong Jeong, and Albert-L\u00e1szl\u00f3 Barab\u00e1si \u201cModeling the Internet\u2019s largescale topology\u201d, 2002 http:\/\/www.pnas.org\/content\/99\/21\/13382.abstract Last access: 22.07.2014","DOI":"10.1073\/pnas.172501399"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"[ACF+12] Ager, Bernhard; Chatzis, Nikolaos; Feldmann, Anja; Sarrar, Nadi; Uhlig, Steve; Willinger, Walter: Anatomy of a Large European IXP. In: ACM SIGCOMM \u201812. 2012.","DOI":"10.1145\/2342356.2342393"},{"key":"12_CR8","unstructured":"[COMM09] Commission of the European Communities: Protecting Europe from large scale cyber-attacks and disruptions: enhancing preparedness, security and resilience. 2009."},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"[FPPS11a] Feld, Sebastian; Perrei, Tim; Pohlmann, Norbert; Schupp, Matthias: Objectives and added value of an Internet Key Figure System for Germany. In: ISSE 2011 Securing Electronic Business Processes. Vieweg+Teubner Verlag, 2011.","DOI":"10.1007\/978-3-8348-8652-1_30"},{"key":"12_CR10","unstructured":"[FPPS11b] Feld, Sebastian; Perrei, Tim; Pohlmann, Norbert; Schupp, Matthias: Ein Internet-Kennzahlensystem f\u00fcr Deutschland: Anforderungen und technische Ma\u00dfnahmen. In: D-A-CH Security 2011. IT-Quartier Oldenburg, 2011."},{"key":"12_CR11","unstructured":"[GOOG12] Google.com: Google Safe Browsing diagnostic page for AS680 (DFN). http:\/\/www.google.com\/safebrowsing\/diagnostic?site=AS:680. Last access: 16.07.2012."},{"key":"12_CR12","unstructured":"[MAXM12a] Maxmind.com. http:\/\/www.maxmind.com\/download\/geoip\/database\/GeoLiteCountry\/GeoIP. dat.gz. Last access: 16.07.2012."},{"key":"12_CR13","unstructured":"[MAXM12b] Maxmind.com. http:\/\/www.maxmind.com\/download\/geoip\/database\/asnum\/GeoIPASNum. dat.gz. Last access: 16.07.2012."},{"key":"12_CR14","unstructured":"[PMAM08] Provos, Niels; Mavrommatis, Panayiotis; Abu Rajab, Moheeb; Monrose, Fabian: All Your iFRAMEs Point To Us. Google Technical Report. 2008."},{"key":"12_CR15","unstructured":"[POTA12] potaroo.net. http:\/\/bgp.potaroo.net\/cidr\/autnums.html. Last access: 16.07.2012."},{"key":"12_CR16","unstructured":"[RIPE12a] RIPE NCC: Routing Information Service (RIS) \u2013 RIPE Network Coordination Centre. http:\/\/www.ripe.net\/data-tools\/stats\/ris\/routing-information-service. Last access: 16.07.2012."},{"key":"12_CR17","unstructured":"[RIPE12b] RIPE NCC. ftp:\/\/ftp.ripe.net\/pub\/stats\/ripencc\/delegated-ripencc-latest. Last access: 16.07.2012."},{"key":"12_CR18","unstructured":"[ROUT12] Routeviews.org. http:\/\/archive.routeviews.org\/oix-route-views\/. Last access: 16.07.2012."},{"key":"12_CR19","unstructured":"[SITE12a] Sitevet.com: SiteVet Autonomous System Repor t AS680 \u2013 DFN. http:\/\/sitevet.com\/pdf\/asn\/AS680. Last access: 16.07.2012."},{"key":"12_CR20","unstructured":"[SITE12b] Sitevet.com: HE Index. http:\/\/sitevet.com\/info\/he_index.php. Last access: 16.07.2012."},{"key":"12_CR21","unstructured":"[SITE12c] Sitevet.com: HE Rank. http:\/\/sitevet.com\/info\/he_rank.php. Last access: 16.07.2012."},{"key":"12_CR22","unstructured":"[TECH11] Technorati: Egypt Counts Cost of Protests, Internet Down-Time. http:\/\/technorati.com\/politics\/article\/egypt-counts-cost-of-protests-internet\/. Last access: 16.07.2012."}],"container-title":["ISSE 2014 Securing Electronic Business Processes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-658-06708-3_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T15:12:53Z","timestamp":1676905973000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-658-06708-3_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783658067076","9783658067083"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-658-06708-3_12","relation":{},"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"18 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}