{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T07:39:56Z","timestamp":1742801996271,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/cns.2015.7346850","type":"proceedings-article","created":{"date-parts":[[2015,12,8]],"date-time":"2015-12-08T22:19:48Z","timestamp":1449613188000},"page":"388-396","source":"Crossref","is-referenced-by-count":5,"title":["Crowd-based detection of routing anomalies on the internet"],"prefix":"10.1109","author":[{"given":"Rahul","family":"Hiran","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Niklas","family":"Carlsson","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nahid","family":"Shahmehri","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1145\/1879141.1879173"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1145\/2096149.2096154"},{"key":"ref31","article-title":"Studying black holes in the internet with hubble","author":"katz-bassett","year":"0","journal-title":"Proc NSDI 2008"},{"key":"ref30","article-title":"Detecting internet outages with precise active probing","author":"quan","year":"2012","journal-title":"USC\/Information Sciences Institute Technical Report"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1145\/1851275.1851228"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1109\/MCOM.2014.6710071"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/PerCom.2012.6199845"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/ICC.2012.6363979"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/ICNP.2006.320179"},{"year":"2013","journal-title":"Dyn Research","key":"ref11"},{"key":"ref12","article-title":"Bgpsec protocol specification","author":"lepinski","year":"2013","journal-title":"IETF4838 informational"},{"key":"ref13","article-title":"DNS Security Introduction and Requirements","author":"arends","year":"2005","journal-title":"RFC 4033 (Proposed Standard)"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/ICCCN.2013.6614187"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/2535771.2535787"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1145\/2663876.2663879"},{"key":"ref17","article-title":"N e-tReview: detecting when interdomain routing goes wrong","author":"haeberlen","year":"2009","journal-title":"Proc NSDI"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/1282380.1282412"},{"key":"ref19","article-title":"Phas: a prefix hijack alert system","author":"lad","year":"2006","journal-title":"Proc Usenix Security Symp"},{"key":"ref28","article-title":"Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems","author":"rowstron","year":"2001","journal-title":"Proc IFIP\/ACM Middleware"},{"year":"0","journal-title":"Dyn Research (2008) Pakistan hijacks youtube","key":"ref4"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1145\/383059.383071"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/978-3-642-36516-4_23"},{"key":"ref6","article-title":"An Infrastructure to Support Secure Internet Routing","author":"lepinski","year":"2012","journal-title":"RFC 6480 (Informational) IETF"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1145\/1364654.1364677"},{"key":"ref5","article-title":"Loopholes for circumventing the constitution: Unrestrained bulk surveillance on americans by collecting network traffic abroad","author":"arnbak","year":"2014","journal-title":"Proc HotPETS"},{"key":"ref8","first-page":"15","article-title":"Securing bgp through secure origin bgp","volume":"6","author":"white","year":"2003","journal-title":"The Internet Protocol Journal"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/49.839934"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/2659899"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/1402946.1402996"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/JPROC.2009.2034031"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1145\/1282427.1282411"},{"key":"ref22","first-page":"19:1","article-title":"Char-acterizing organizational use of web-based services: Methodology, challenges, observations, and insights","volume":"5","author":"gill","year":"2011","journal-title":"ACM TWEB"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/2398776.2398779"},{"key":"ref24","article-title":"iplane: An information plane for distributed services","author":"madhyastha","year":"2006","journal-title":"Proc OSDI"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1214\/aoms\/1177729885"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1145\/2504730.2504760"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1145\/2398776.2398786"}],"event":{"name":"2015 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2015,9,28]]},"location":"Florence, Italy","end":{"date-parts":[[2015,9,30]]}},"container-title":["2015 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7336674\/7346791\/07346850.pdf?arnumber=7346850","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T01:41:22Z","timestamp":1490406082000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7346850\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/cns.2015.7346850","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}