{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:12:04Z","timestamp":1761401524549},"reference-count":42,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,1]]},"DOI":"10.1109\/comsnets.2011.5716486","type":"proceedings-article","created":{"date-parts":[[2011,2,18]],"date-time":"2011-02-18T14:10:46Z","timestamp":1298038246000},"page":"1-10","source":"Crossref","is-referenced-by-count":10,"title":["Impact of prefix hijacking on payments of providers"],"prefix":"10.1109","author":[{"given":"P","family":"Bangera","sequence":"first","affiliation":[]},{"given":"S","family":"Gorinsky","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1198255.1198263"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282402"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879151"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00975-4_21"},{"journal-title":"DrPeering International","year":"2010","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.236"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159955"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633059"},{"journal-title":"Gnuplot","year":"0","key":"ref35"},{"journal-title":"Oops Pow Surprise&#x2026;24 Hours of Video All Up in Your Eyes!","year":"2010","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402996"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1375457.1375508"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.95"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1364654.1364658"},{"key":"ref13","first-page":"593","article-title":"An Analysis on Selective Dropping Attack in BGP","author":"zhang","year":"2004","journal-title":"IEEE IPCCC 2004"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2009.2034031"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997152"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/49.839934"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755701"},{"year":"0","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402989"},{"journal-title":"CAIDA","year":"0","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282411"},{"journal-title":"CBGP Sourceforge SCM Repositories","year":"2010","author":"quoitin","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.872576"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2009.5425977"},{"key":"ref29","first-page":"13","article-title":"Can ISPs be Profitable Without Violating&#x201D; Network Neutrality&#x201C;?","author":"dhamdhere","year":"2008","journal-title":"Proc of NetEcon 2008"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.1106"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282412"},{"key":"ref7","first-page":"153","article-title":"PHAS: A Prefix Hijack Alert System","author":"lad","year":"2006","journal-title":"Proc of USENIX-SS 2006"},{"journal-title":"Information Sciences Institute University of Southern California","article-title":"Internet Protocol DARPA Internet Program Protocol Specification","year":"1981","key":"ref2"},{"key":"ref9","first-page":"3","article-title":"Accurate Real-time Identification of IP Hijacking","author":"hu","year":"2007","journal-title":"SSP Proceedings 2007"},{"key":"ref1","article-title":"A Border Gateway Protocol (BGP-4)","author":"rekhter","year":"1995","journal-title":"RFC 1771"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1005686.1005723"},{"journal-title":"Nanog mailing list","year":"2008","key":"ref22"},{"journal-title":"YouTube Hijacking A RIPE NCC RIS Case Study","year":"2008","key":"ref21"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505224"},{"journal-title":"Bgpmon","year":"0","key":"ref24"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"},{"journal-title":"RIPE RIS","year":"0","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.334"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2005.1541716"}],"event":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","start":{"date-parts":[[2011,1,4]]},"location":"Bangalore","end":{"date-parts":[[2011,1,8]]}},"container-title":["2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5710820\/5716386\/05716486.pdf?arnumber=5716486","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T03:28:44Z","timestamp":1490066924000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5716486\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/comsnets.2011.5716486","relation":{},"subject":[],"published":{"date-parts":[[2011,1]]}}}