{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T07:50:25Z","timestamp":1764402625188},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/icc.2014.6883431","type":"proceedings-article","created":{"date-parts":[[2014,9,3]],"date-time":"2014-09-03T10:10:33Z","timestamp":1409739033000},"page":"884-889","source":"Crossref","is-referenced-by-count":5,"title":["Malicious BGP hijacks: Appearances can be deceiving"],"prefix":"10.1109","author":[{"given":"Pierre-Antoine","family":"Vervier","sequence":"first","affiliation":[]},{"given":"Quentin","family":"Jacquemart","sequence":"additional","affiliation":[]},{"given":"Johann","family":"Schlamp","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Thonnard","sequence":"additional","affiliation":[]},{"given":"Georg","family":"Carle","sequence":"additional","affiliation":[]},{"given":"Guillaume","family":"Urvoy-Keller","sequence":"additional","affiliation":[]},{"given":"Ernst","family":"Biersack","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Dacier","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505207"},{"journal-title":"YouTube Hijacking A RIPE NCC RIS Case Study","year":"2008","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398780"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2011.03.015"},{"key":"16","first-page":"229","article-title":"Characterizing large-scale routing anomalies: A case study of the china telecom incident","author":"hiran","year":"2013","journal-title":"PAM Springer"},{"key":"13","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/2479957.2479959","article-title":"A forensic case study on AS hijacking: The attacker's perspective","author":"schlamp","year":"2013","journal-title":"SIGCOMM CCR"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2010.5466660"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398779"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2013.6562916"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2006.320179"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54999-1_11"},{"journal-title":"Internet Routing Registry (IRR net)","year":"0","key":"22"},{"year":"0","key":"23"},{"journal-title":"Authentication Methods Used in the RIPE Database","year":"2011","key":"24"},{"journal-title":"Whois afrinic net Leaks Passwords","year":"2012","key":"25"},{"journal-title":"Dear RIPE Please Don't Encourage Phishing","year":"2012","key":"26"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282411"},{"key":"2","first-page":"3","article-title":"Accurate real-time identification of ip prefix hijacking","author":"hu","year":"2007","journal-title":"Security and Privacy IEEE"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402996"},{"key":"1","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1145\/1151659.1159947","article-title":"Understanding the network-level behavior of spammers","author":"ramachandran","year":"2006","journal-title":"SIGCOMM ACM"},{"journal-title":"Routing information service","year":"0","key":"7"},{"journal-title":"University of Oregon RouteViews Project","year":"0","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOM.2007.4550358"},{"key":"4","article-title":"PHAS: A prefix hijack alert system","author":"lad","year":"2006","journal-title":"Usenix Security"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04492-2_40"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282412"}],"event":{"name":"ICC 2014 - 2014 IEEE International Conference on Communications","start":{"date-parts":[[2014,6,10]]},"location":"Sydney, NSW","end":{"date-parts":[[2014,6,14]]}},"container-title":["2014 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6878057\/6883277\/06883431.pdf?arnumber=6883431","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T15:50:20Z","timestamp":1498146620000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6883431\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/icc.2014.6883431","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}