{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T19:18:00Z","timestamp":1769800680171,"version":"3.49.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,14]],"date-time":"2025-12-14T00:00:00Z","timestamp":1765670400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,14]],"date-time":"2025-12-14T00:00:00Z","timestamp":1765670400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,14]]},"DOI":"10.1109\/comcomap68359.2025.11353180","type":"proceedings-article","created":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T21:19:25Z","timestamp":1769721565000},"page":"165-170","source":"Crossref","is-referenced-by-count":0,"title":["Detection of BGP Routing Leaks Using Historical Baseline Profiling"],"prefix":"10.1109","author":[{"given":"Rifqy","family":"Hakimi","sequence":"first","affiliation":[{"name":"University of Essex,School of Computer Science and Electronic Engineering,Colchester,United Kingdom"}]},{"given":"Martin J.","family":"Reed","sequence":"additional","affiliation":[{"name":"University of Essex,School of Computer Science and Electronic Engineering,Colchester,United Kingdom"}]}],"member":"263","reference":[{"key":"ref1","article-title":"NIST RPKI Monitor Analysis Report","year":"2025"},{"key":"ref2","article-title":"BGPsec \u2014 could you run it if you wanted to?","author":"Bruder","year":"2025"},{"key":"ref3","article-title":"RPKI Quarterly Planning","year":"2025"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7908"},{"key":"ref5","article-title":"PHAS: a prefix hijack alert system","volume-title":"USENIX Security Symposium","author":"Lad"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1402996"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282411"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637231"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2008.4575169"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2869798"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110257"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110926"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-1166-8_9"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/s24196414"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2016.7785326"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC55528.2022.9912989"},{"key":"ref17","first-page":"1751","article-title":"A System to Detect Forged-Origin BGP Hijacks","volume-title":"NSDI","author":"Holterbach","year":"2024"},{"key":"ref18","first-page":"131750P","article-title":"BGP prefix hijack detection algorithm based on MOAS event feature","volume-title":"CNSSE","volume":"13175","author":"Chen","year":"2024"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN64016.2025.10942841"},{"key":"ref20","article-title":"RIS Data Access"},{"key":"ref21","article-title":"The Anatomy of a Leak: AS9121","author":"Popescu","year":"2005"},{"key":"ref22","article-title":"A Major BGP Hijack by AS55410-Vodafone Idea Ltd","author":"Siddiqui","year":"2021"},{"key":"ref23","article-title":"Not just another BGP hijack","author":"Siddiqui","year":"2020"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref25","article-title":"Hijack by AS4761 Indosat: A quick report","author":"Toonk","year":"2011"},{"key":"ref26","article-title":"BGP leaks in indonesia.\u201d RIPE Labs","author":"Wilhelm","year":"2014"},{"key":"ref27","article-title":"Chinese ISP hijacked 10% of the Internet","author":"Toonk","year":"2010"}],"event":{"name":"2025 Computing, Communications and IoT Applications (ComComAp)","location":"Madrid, Spain","start":{"date-parts":[[2025,12,14]]},"end":{"date-parts":[[2025,12,17]]}},"container-title":["2025 Computing, Communications and IoT Applications (ComComAp)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11353105\/11353106\/11353180.pdf?arnumber=11353180","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T07:34:18Z","timestamp":1769758458000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11353180\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,14]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/comcomap68359.2025.11353180","relation":{},"subject":[],"published":{"date-parts":[[2025,12,14]]}}}