{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:37:24Z","timestamp":1730209044847,"version":"3.28.0"},"reference-count":54,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/cns.2019.8802699","type":"proceedings-article","created":{"date-parts":[[2019,8,22]],"date-time":"2019-08-22T13:55:11Z","timestamp":1566482111000},"page":"73-81","source":"Crossref","is-referenced-by-count":2,"title":["CollusiveHijack: A New Route Hijacking Attack and Countermeasures in Opportunistic Networks"],"prefix":"10.1109","author":[{"given":"Ala","family":"Altaweel","sequence":"first","affiliation":[]},{"given":"Radu","family":"Stoleru","sequence":"additional","affiliation":[]},{"given":"Guofei","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Arnab Kumar","family":"Maity","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1007\/s00779-005-0046-3"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.4108\/ICST.SIMUTOOLS2009.5674"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/MASCOT.2000.876573"},{"key":"ref32","article-title":"Measuring normality in http traffic for anomaly-based intrusion detection","volume":"45","author":"tapiador","year":"2004","journal-title":"Computer Networks"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/JSAC.2007.070807"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/TDSC.2010.46"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1145\/1409985.1410008"},{"year":"0","journal-title":"IBR-DTN A modular and lightweight implementation of the bundle protocol","key":"ref36"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1145\/2942358.2942374"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.17487\/rfc6257"},{"key":"ref28","article-title":"A light-weight distributed scheme for detecting ip prefix hiiacks in real-time","author":"zheng","year":"0","journal-title":"SIGCOMM'07"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/TNET.2010.2066284"},{"key":"ref29","article-title":"The kolmogorov-smirnov test for goodness of fit","volume":"46","author":"frank","year":"1951","journal-title":"Journal of the American Statistical Association"},{"year":"0","journal-title":"Firechat Google play store","key":"ref2"},{"year":"0","journal-title":"Distressnet-ng project","key":"ref1"},{"year":"0","journal-title":"Ripe myasn system","key":"ref20"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/1452335.1452337"},{"key":"ref21","article-title":"Phas: A prefix hijack alert system","author":"lad","year":"0","journal-title":"USENIX '06"},{"year":"0","journal-title":"BGPmon (Colorado State University)","key":"ref24"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1145\/3232755.3234554"},{"year":"0","journal-title":"Route views proiectiuniversitv of oregon)","key":"ref26"},{"year":"0","journal-title":"Routing information service (RIS)","key":"ref25"},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.1145\/2398776.2398779"},{"doi-asserted-by":"publisher","key":"ref51","DOI":"10.1109\/JSAC.2016.2558978"},{"doi-asserted-by":"publisher","key":"ref54","DOI":"10.1109\/49.839934"},{"doi-asserted-by":"publisher","key":"ref53","DOI":"10.17487\/rfc6480"},{"doi-asserted-by":"publisher","key":"ref52","DOI":"10.17487\/RFC8205"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/1288107.1288116"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/TIFS.2017.2737970"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.4236\/am.2013.44087"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/EuroSP.2016.40"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/TWC.2010.04.090557"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/TDSC.2012.84"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/MWC.2010.5601956"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/INFCOM.2009.5062170"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/TIFS.2011.2173195"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1016\/j.cose.2016.12.001"},{"year":"0","journal-title":"Bgpmon","key":"ref19"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/2942358.2942374"},{"year":"0","journal-title":"1am Censorship-resistant microblogging","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.17487\/rfc6693"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/961268.961272"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/1282380.1282422"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/2030613.2030634"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1109\/SP.2007.7"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/CNSC.2014.6906649"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1109\/INMIC.2001.995315"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1007\/3-540-36492-7_20"},{"key":"ref48","article-title":"Listen and whisper: Security mechanisms for bgn","author":"subramanian","year":"0","journal-title":"NSDI'04"},{"year":"0","author":"tonnesen","journal-title":"Implementing and extending the Optimized Link State Routing Protocol","key":"ref47"},{"year":"0","journal-title":"The R Project for Statistical Computing","key":"ref42"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1590\/S1806-37132015000000215"},{"year":"0","author":"lynn","journal-title":"The Pairing-Based Cryptography (PBC) library","key":"ref44"},{"year":"0","journal-title":"Rcpp Seamless r and c++ integration","key":"ref43"}],"event":{"name":"2019 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2019,6,10]]},"location":"Washington DC, DC, USA","end":{"date-parts":[[2019,6,12]]}},"container-title":["2019 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8790401\/8802631\/08802699.pdf?arnumber=8802699","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T11:36:36Z","timestamp":1658144196000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8802699\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":54,"URL":"https:\/\/doi.org\/10.1109\/cns.2019.8802699","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}