{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T22:38:05Z","timestamp":1757630285593,"version":"3.44.0"},"reference-count":182,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3602054","type":"journal-article","created":{"date-parts":[[2025,8,25]],"date-time":"2025-08-25T20:47:29Z","timestamp":1756154849000},"page":"155759-155777","source":"Crossref","is-referenced-by-count":0,"title":["Failures and Resilience in the IP Era: Navigating the Fragility of Modern Telecommunications Networks\u2014The Sovereign Functions"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-0780-854X","authenticated-orcid":false,"given":"Raymond","family":"Owen","sequence":"first","affiliation":[{"name":"University of Technology Sydney, Ultimo, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8560-5951","authenticated-orcid":false,"given":"Adam","family":"Bryant","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, Ultimo, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7806-5750","authenticated-orcid":false,"given":"Leigh","family":"Finch","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, Ultimo, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9563-5943","authenticated-orcid":false,"given":"Daniel","family":"Franklin","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, Ultimo, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4676-3014","authenticated-orcid":false,"given":"Mahrokh","family":"Abdollahi","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, Ultimo, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4282-6666","authenticated-orcid":false,"given":"Mehran","family":"Abolhasan","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, Ultimo, NSW, Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v12i4.pp3943-3950"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.03.005"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/s23010086"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.17487\/rfc4271","volume-title":"RFC 4271: A Border Gateway Protocol 4 (BGP-4)","author":"Rekhter","year":"2006"},{"volume-title":"RFC2328: OSPF Version 2","year":"1998","author":"Moy","key":"ref5"},{"volume-title":"RFC1035: Domain Names-Implementation and Specification","year":"1987","author":"Mockapetris","key":"ref6"},{"volume-title":"RFC2131: Dynamic Host Configuration Protocol","year":"1997","author":"Droms","key":"ref7"},{"volume-title":"RFC 5905: Network Time Protocol Version 4: Protocol and Algorithms Specification","year":"2010","author":"Mills","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2002.94144"},{"volume-title":"How Cloud Drives Changes to Network Licensing","year":"2024","author":"Garn","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON.2017.8249081"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3773"},{"article-title":"Firewall: Configuration deficiencies","year":"2021","author":"Fritts","key":"ref13"},{"volume-title":"Assessment of Rogers Networks for Resiliency and Reliability Following the 8 July 2022 Outage\u2014Executive Summary","year":"2025","key":"ref14"},{"volume-title":"Investigation into BT Following 999 Emergency Call Service Outage on 25 June 2023","year":"2025","key":"ref15"},{"volume-title":"Review into the Optus Outage of 8 November 2023\u2014Final Report","year":"2025","author":"Bean","key":"ref16"},{"volume-title":"The July 2 Communication Failure and Our Response","year":"2022","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-021-00071-z"},{"volume-title":"Espa\u00f1a Hit with Major Telecom Blackout After Power Outage April 28th","year":"2025","author":"Weissberger","key":"ref19"},{"volume-title":"Ddos Disrupts Japanese Mobile Giant Docomo","year":"2025","author":"Muncaster","key":"ref20"},{"volume-title":"Impact of Verizon\u2019s September 30 Outage on Internet Traffic","year":"2025","author":"Belson","key":"ref21"},{"volume-title":"February 22, 2024 At&t Mobility Network Outage: Report and Findings","year":"2024","key":"ref22"},{"volume-title":"Bharti Airtel Network Outage Disrupts Mobile and Broadband Services Across India","year":"2024","key":"ref23"},{"volume-title":"Russian Hacker Claims Responsibility for Massive Cyberattack in Ukraine","year":"2025","key":"ref24"},{"volume-title":"Telef\u00f3nica Suffers Massive Outage","year":"2025","author":"McLaren-Kennedy","key":"ref25"},{"volume-title":"Orange Presents the Conclusions of the Internal Investigation into the 2 June Crisis That Impacted Emergency Calls in France","year":"2025","key":"ref26"},{"volume-title":"June 15 2020 T-Mobile Network Outage Report","year":"2020","key":"ref27"},{"volume-title":"Dt, 1&1, Vodafone and O2: Internet Outage in Germany","year":"2020","key":"ref28"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948208"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1002\/nem.70002"},{"volume-title":"DNS and Bind","year":"2006","author":"Liu","key":"ref31"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICCS45141.2019.9065354"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487824"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948219"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278534"},{"key":"ref36","first-page":"469","article-title":"A general approach to network configuration analysis","volume-title":"Proc. 12th USENIX Symp. Networked Syst. Design Implement. (NSDI 15)","author":"Fogel"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068863"},{"key":"ref38","volume-title":"TCP\/IP Illustrated: The Protocols","volume":"1","author":"Fall","year":"2012"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3105741"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2009.2034031"},{"volume-title":"Investigation Report\u2014Optus Outage 8 November 2023 (redacted)","year":"2025","key":"ref41"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.107.195701"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.5121\/ijdps.2011.2506"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3212586"},{"volume-title":"Achieving Network Resilience by Design","year":"2022","author":"Linabarger","key":"ref45"},{"volume-title":"Architecting for Resiliency","year":"2024","key":"ref46"},{"volume-title":"Resilience and Redundancy: Key Principles of it Infrastructure","year":"2025","key":"ref47"},{"volume-title":"IT Resilience: Ensuring Business Continuity During Disruptions","year":"2025","key":"ref48"},{"key":"ref49","first-page":"1","article-title":"Resilient network architecture for 5G and beyond","volume-title":"Proc. IEEE Int. Conf. Commun. Workshops (ICC Workshops)","author":"Zhang"},{"volume-title":"Annual Outage Analysis 2023","year":"2023","author":"Lawrence","key":"ref50"},{"volume-title":"Consumers and Businesses Expected to Take Rogers to Court Over Network Outage","year":"2025","author":"Alini","key":"ref51"},{"volume-title":"Telstra Pays $3 Million Penalty for Triple Zero Outage","year":"2025","key":"ref52"},{"volume-title":"Optus Pays $12 Million Penalty for Triple Zero Outage","year":"2025","key":"ref53"},{"volume-title":"Optus Outage Cuts Off Millions, Emergency Calls","year":"2023","author":"Wiggins","key":"ref54"},{"journal-title":"Optus Outage: A Catalyst for Integrated National Resilience Planning","year":"2023","author":"Howe","key":"ref55"},{"volume-title":"Optus CEO to Face Grilling at Senate Inquiry","year":"2023","key":"ref56"},{"volume-title":"Bt Fined $17.5m for 999 Outage as Ofcom Finds Telco \u2018Fell Woefully Short of its Responsibilities","year":"2024","author":"Trendall","key":"ref57"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC65282.2025.11059627"},{"volume-title":"Best Practices for Mastering Network Resilience","year":"2024","author":"Egan","key":"ref59"},{"volume-title":"What is Role-based Access Control (RBAC)","year":"2025","key":"ref60"},{"volume-title":"What is Role-Based Access Control (RBAC)","year":"2024","key":"ref61"},{"volume-title":"8 Security Practices to use in Your Employee Training and Awareness Program","year":"2025","key":"ref62"},{"volume-title":"Cm2 Courses & Certifications","year":"2020","key":"ref63"},{"volume-title":"Ofcom Opens Consultation into Network Resilience","year":"2025","author":"Hathway","key":"ref64"},{"volume-title":"Network Configuration Management: Benefits & Importance","year":"2025","author":"Dooley","key":"ref65"},{"volume-title":"Consultants. The Importance of Regular Security Audits and Assessments in it.","year":"2025","key":"ref66"},{"volume-title":"Network Configuration Management: Automating Tasks","year":"2023","key":"ref67"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102162"},{"journal-title":"Network Segmentation Best Practices","year":"2024","key":"ref69"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWorkshops50388.2021.9473530"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3073598"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.52953\/PYAF8065"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.30574\/wjarr.2023.18.3.1166"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.71"},{"volume-title":"Network Failover: Cellular Strategies That Protect Against Downtime","year":"2025","key":"ref75"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2871089"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2021.1059"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2015.7405566"},{"volume-title":"BCI Horizon Scan Report","year":"2024","key":"ref79"},{"volume-title":"Annual Outage Analysis 2025","year":"2025","author":"Lawrence","key":"ref80"},{"volume-title":"Digging into the Optus Outage","year":"2023","author":"Madory","key":"ref81"},{"volume-title":"Troubleshooting BGP: A Practical Guide to Understanding and Troubleshooting BGP","year":"2016","author":"Jain","key":"ref82"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54999-1_11"},{"volume-title":"RFC 5065: Autonomous System Confederations for BGP.","year":"2007","author":"Traina","key":"ref84"},{"volume-title":"BGP Flapping, BGP Flapping Reasons, and the Ways to Resolve Flapping Issues","year":"2025","key":"ref85"},{"volume-title":"RFC2439: BGP Route Flap Damping","year":"1998","author":"Villamizar","key":"ref86"},{"volume-title":"RFC7196: Making Route Flap Damping Usable","year":"2014","author":"Mohapatra","key":"ref87"},{"volume-title":"What Happened? The Amazon Route 53 BGP Hijack to Take over Ethereum Cryptocurrency Wallets","year":"2025","author":"Siddiqui","key":"ref88"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/3211852.3211862"},{"journal-title":"Resilient Interdomain Traffic Exchange: BGP Security and Ddos Mitigation (2nd Draft)","year":"2019","author":"Sriram","key":"ref90"},{"journal-title":"BGP Flowspec: DDOS Mitigation","year":"2025","author":"Bhardwaj","key":"ref91"},{"key":"ref92","doi-asserted-by":"crossref","DOI":"10.17487\/RFC7908","volume-title":"Rfc 7908: Problem Definition and Classification of BGP Route Leaks","author":"Sriram","year":"2016"},{"journal-title":"Cloudflare Radar: Overview for AS812, ROGERS-COMMUNICATIONS\u2014Rogers Cable, 2022-07-08 to 2022-07-09","year":"2022","key":"ref93"},{"volume-title":"Americans Wake to Widespread At&t Cellular Outages","year":"2025","author":"Vigliarolo","key":"ref94"},{"volume-title":"AS7018 Overview |Cloudflare Radar","year":"2025","key":"ref95"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.18080\/jtde.v11n4.898"},{"volume-title":"Global Microsoft Cloud-Service Outage Traced to Rapid BGP Router Updates","year":"2023","author":"Bednarz","key":"ref97"},{"volume-title":"Cloudflare Outage on June 21 2022","year":"2022","author":"Strickx","key":"ref98"},{"volume-title":"Telia Outage and its Ripple Effect","year":"2025","author":"Eide","key":"ref99"},{"journal-title":"Incident Review\u2014An Account of the Telia Outage and its Ripple Effect","year":"2025","author":"Improta","key":"ref100"},{"volume-title":"More Details About the October 4 Outage","year":"2025","author":"Janardhan","key":"ref101"},{"volume-title":"Why Facebook, Instagram, and Whatsapp all Went Down Today","year":"2025","author":"Barrett","key":"ref102"},{"volume-title":"Cloudflare Outage on July 17","year":"2020","author":"Graham-Cumming","key":"ref103"},{"volume-title":"Route Leak Causes Major Google Outage","year":"2025","author":"Siddiqui","key":"ref104"},{"volume-title":"Google Routing Blunder Sent Japan\u2019s Internet Dark on Friday","year":"2025","author":"Chirgwin","key":"ref105"},{"volume-title":"Route Leak Causes Global Outage in Level 3 Network","year":"2025","author":"Kephart","key":"ref106"},{"volume-title":"Massive Route Leak Causes Internet Slowdown","year":"2025","author":"Toonk","key":"ref107"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423624"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15509-8_3"},{"article-title":"In depth analysis of BGP protocol, its security vulnerabilities and solutions","year":"2021","author":"Singh","key":"ref110"},{"volume-title":"Configuring Authentication for BGP","year":"2019","key":"ref111"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761838"},{"volume-title":"Network Outage\u2014Rotko Networks Infrastructure","year":"2024","key":"ref113"},{"volume-title":"Lesson from a Network Outage: Networks Need Automated Reasoning","year":"2025","author":"Mahajan","key":"ref114"},{"volume-title":"RFC4364: BGP\/MPLS IP Virtual Private Networks (VPNS)","year":"2006","author":"Rosen","key":"ref115"},{"key":"ref116","first-page":"66","article-title":"A review: Multi protocol label switching (MPLS)","volume":"4","author":"Shawl","year":"2014","journal-title":"Int. J. Eng. Res. Appl."},{"issue":"13","key":"ref117","first-page":"2664","article-title":"A exploration of multi-protocol label switching (MPLS) network: A review","volume":"7","author":"Dr","year":"2020","journal-title":"J. Crit. Rev."},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/ICWCAPP57292.2022.00044"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2018.6129"},{"volume-title":"RFC 5920: Security Framework for MPLS and GMPLS Networks","year":"2010","author":"Fang","key":"ref120"},{"volume-title":"Aryaka","year":"2021","key":"ref121"},{"volume-title":"Telef\u00f3nica\u2019s Spain Outage Disrupts First Responders","year":"2025","author":"Corvin","key":"ref122"},{"volume-title":"Telef\u00f3nica Network Outage Causes Nationwide Emergency Services Disruption in Spain","year":"2025","author":"Mach","key":"ref123"},{"volume-title":"RFC1034: Domain Names-Concepts and Facilities","year":"1987","author":"Mockapetris","key":"ref124"},{"volume-title":"Zoom Outage\u2014What Happened and How it was Fixed","year":"2025","author":"Krol","key":"ref125"},{"volume-title":"Akamai DNS Outage Analysis","year":"2025","author":"Medina","key":"ref126"},{"volume-title":"Akamai DNS Global Outage Takes Down Major Websites, Online Services","year":"2025","author":"Gatlan","key":"ref127"},{"volume-title":"Facebook Outage: What Went Wrong and Why Did it Take so Long to Fix After Social Platform Went Down?","year":"2025","author":"Taylor","key":"ref128"},{"volume-title":"Understanding How Facebook Disappeared from the Internet","year":"2025","key":"ref129"},{"volume-title":"Telstra Backtracks on Claim Network was Hit by Cyber Attack","year":"2025","author":"Thompson","key":"ref130"},{"volume-title":"Widespread Internet Outages Reported by Telstra Customers Attributed to Cyber Attack","year":"2025","author":"Chapman","key":"ref131"},{"volume-title":"What Happened When Marketo\u2019s Domain Name Expired","year":"2025","author":"Xu","key":"ref132"},{"volume-title":"Sony Forgets to Renew Domain Name, Takes Down Online Gaming Service Soe.com","year":"2025","author":"Allemann","key":"ref133"},{"volume-title":"Introduction to DHCP, DNS, and APIPA","year":"2024","author":"Paudel","key":"ref134"},{"key":"ref135","first-page":"171","article-title":"Administration of DHCP addressing","volume":"2016","author":"Kareem","year":"2016","journal-title":"Int. J. Recent Res. Math. Comput. Sci. Inf. Technol."},{"volume-title":"FCC Issues Report on Nationwide AT&T Wireless Outage","year":"2025","key":"ref136"},{"volume-title":"Cloudflare\u2019s View of the Rogers Communications Outage in Canada","year":"2025","author":"Tom\u00e9","key":"ref137"},{"volume-title":"[UPDATE: RFO] Known Outage in the northern California Area","year":"2025","key":"ref138"},{"volume-title":"Botched Microsoft Update Knocks Windows 8, 10 PCS Offline\u2014Regardless of ISP.","year":"2025","author":"Hall","key":"ref139"},{"volume-title":"Leap Second Hits Qantas Air Bookings, While Reddit and Mozilla Stutter","year":"2012","author":"Arthur","key":"ref140"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9091398"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-021-00080-y"},{"volume-title":"Eurex Derivatives Exchange Suffers Outage Due to Glitch in Time Synchronization","year":"2025","author":"McLeod","key":"ref143"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/BSC57238.2023.10201458"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.2971551"},{"article-title":"RFC 958: Network time protocol (NTP)","year":"1985","author":"Mills","key":"ref146"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23233"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM55787.2022.9964658"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA61755.2024.10710776"},{"volume-title":"Precision Time Protocol Telecom Profile for Phase\/time Synchronization with Full Timing Support from the Network","year":"2022","key":"ref150"},{"volume-title":"Precision Time Protocol Telecom Profile for Phase\/Time Synchronization with Partial Timing Support from the Network","year":"2022","key":"ref151"},{"volume-title":"Our Triple Zero Outage: The Facts, the Cause, and What\u2019s Next","year":"2025","author":"Brady","key":"ref152"},{"volume-title":"Crowdstrike Outage Explained: What Caused it and What\u2019s Next","year":"2025","author":"Kerner","key":"ref153"},{"volume-title":"What Caused the Crowdstrike Outage: A Detailed Breakdown","year":"2025","key":"ref154"},{"volume-title":"Centurylink Network Outage Report","year":"2018","key":"ref155"},{"volume-title":"Investigation Report into the Triple Zero Service Disruptions of 4&26","year":"2018","key":"ref156"},{"journal-title":"Microsoft Teams Buckles Due to Expired Certificate","year":"2020","author":"Roy","key":"ref157"},{"journal-title":"Ericsson Outage: Expired Certificate Knocks Millions of U.K. Mobile Phones Offline","year":"2025","author":"Nohe","key":"ref158"},{"volume-title":"Decision to Conclude Investigation into Telef\u00f3nica U.K. Limited\u2019s Compliance with Section 105a(4) of the Communications Act","year":"2003","key":"ref159"},{"volume-title":"Apology for Mobile Communication Service Troubles","year":"2025","key":"ref160"},{"volume-title":"2-Hour Statewide 911 Outage Blamed on Firewall Problem","year":"2025","author":"Shapiro","key":"ref161"},{"journal-title":"In the Matter of Cellco Partnership D\/B\/A Verizon Wireless","year":"2025","key":"ref162"},{"volume-title":"Cloudflare Outage Caused by Bad Software Deploy (Updated)","year":"2025","author":"Graham-Cumming","key":"ref163"},{"volume-title":"Google Cloud Datastore Incident #19006","year":"2019","key":"ref164"},{"volume-title":"What Happened to Kerberos Authentication After Installing the November 2022\/OOB Updates","year":"2025","author":"Cartwright","key":"ref165"},{"volume-title":"Level 3 Nationwide Outage","year":"2016","key":"ref166"},{"volume-title":"Statewide 911 Outage was Caused By 911 Vendor\u2019s Malfunctioning Firewall","year":"2025","author":"Brodkin","key":"ref167"},{"volume-title":"Cloudflare Suffers 2nd Major Internet Outage in a Week. This Time Due to Globally Deploying a Rogue Regex Rule","year":"2025","author":"Lobo","key":"ref168"},{"journal-title":"Verizon Wireless to Pay Over $1 Million to Settle FCC Investigation into 911 Outage in Six States","year":"2025","key":"ref169"},{"volume-title":"Verizon to Pay $1m Penalty Due to 2022 Outage that Blocked 911 Calls in Se.","year":"2025","key":"ref170"},{"volume-title":"Identity and Access Management Failure in Google Cloud Causes Widespread Internet Service Disruptions","year":"2025","author":"Riley","key":"ref171"},{"volume-title":"Google Cloud Outage Analysis","year":"2025","key":"ref172"},{"volume-title":"Multiple GCP Products are Experiencing Service Issues","year":"2025","key":"ref173"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2024.049970"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3068788"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/ICBDS61829.2024.10837028"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3152787"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC51071.2022.9771947"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.109984"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3037108"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT54382.2022.10152245"},{"key":"ref182","first-page":"817","article-title":"Bohatei: Flexible and elastic DDoS defense","volume-title":"Proc. 24th USENIX Secur. Symp. (USENIX Secur.)","author":"Fayaz"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11136144.pdf?arnumber=11136144","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T17:48:07Z","timestamp":1757526487000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11136144\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":182,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3602054","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2025]]}}}