{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:39:35Z","timestamp":1729669175624,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1109\/icct.2013.6820405","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T18:58:25Z","timestamp":1401476305000},"page":"383-387","source":"Crossref","is-referenced-by-count":0,"title":["Detecting AS hijacking in one administrative domain"],"prefix":"10.1109","author":[{"family":"Chunxiu Li","sequence":"first","affiliation":[]},{"family":"Yujie Ma","sequence":"additional","affiliation":[]},{"family":"Ke Li","sequence":"additional","affiliation":[]},{"family":"Xin Li","sequence":"additional","affiliation":[]},{"family":"Jiangang Zhou","sequence":"additional","affiliation":[]},{"family":"Shanzhi Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","journal-title":"Oregon Route Views","key":"15"},{"year":"0","key":"16"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1145\/2479957.2479959"},{"year":"0","journal-title":"The Bgpmon Project","key":"14"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1145\/1402946.1402996"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1145\/1282427.1282412"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1145\/633026.633027"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1145\/2398776.2398779"},{"year":"2006","author":"rekhter","journal-title":"A Border Gateway Protocol 4 (BGP-4) RFC 4271 Jan","key":"1"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.17487\/rfc6483"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/49.839934"},{"key":"6","first-page":"866","article-title":"Model construction on prefix hijacking attack","author":"zhao","year":"2012","journal-title":"Proceedings of 14th IEEE International Conference on Communication Technology (ICCT)"},{"key":"5","first-page":"153","article-title":"Phas: A prefix hijack alert system","volume":"2","author":"lad","year":"2006","journal-title":"Proceedings of the 15th USEN1X Security Symposium"},{"year":"2008","journal-title":"YouTube Hijacking A RIPE NCC RIS Case Study","key":"4"},{"key":"9","doi-asserted-by":"crossref","DOI":"10.1145\/1266977.1266980","article-title":"On interdomain routing security and pretty secure bgp (psbgp)","author":"oorschot","year":"2007","journal-title":"ACM TISSEC '07"},{"key":"8","first-page":"15","article-title":"Securing bgp through secure origin bgp","volume":"6","author":"white","year":"2003","journal-title":"Internet Protocol Journal"}],"event":{"name":"2013 15th IEEE International Conference on Communication Technology (ICCT)","start":{"date-parts":[[2013,11,17]]},"location":"Guilin, China","end":{"date-parts":[[2013,11,19]]}},"container-title":["2013 15th IEEE International Conference on Communication Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6813703\/6820339\/06820405.pdf?arnumber=6820405","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T14:47:49Z","timestamp":1602686869000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6820405"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icct.2013.6820405","relation":{},"subject":[],"published":{"date-parts":[[2013,11]]}}}