{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:40:29Z","timestamp":1729662029585,"version":"3.28.0"},"reference-count":41,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/icitst.2013.6750195","type":"proceedings-article","created":{"date-parts":[[2014,3,27]],"date-time":"2014-03-27T11:20:46Z","timestamp":1395919246000},"page":"219-230","source":"Crossref","is-referenced-by-count":0,"title":["Internet Unite-and-Conquer architecture"],"prefix":"10.1109","author":[{"given":"Kamyab","family":"Karimi","sequence":"first","affiliation":[]},{"given":"Carl","family":"Hauser","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1198255.1198259"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282415"},{"journal-title":"Mixing Patterns in Networks","year":"2002","author":"newman","key":"17"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/GRID.2008.4662809"},{"journal-title":"The Rich-Club Phenomenon in the Internet Topology","year":"2003","author":"zhou","key":"18"},{"journal-title":"DNS Security Introduction and Requirements","year":"0","author":"larson","key":"33"},{"key":"15","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1145\/316194.316229","article-title":"On power-Law relationships of the internet topology","author":"faloutsos","year":"1999","journal-title":"SIGCOMM"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1145\/501993.501996"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.87.258701"},{"year":"0","key":"39"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1516539.1516541"},{"journal-title":"Why the Internet Is so 'Small'?","year":"2010","author":"zhou","key":"14"},{"journal-title":"Internet Routing Architectures","year":"2000","author":"halabi","key":"37"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282415"},{"journal-title":"Public-Key Cryptography Standards (PKCS) #1 RSA Cryptography Specifications Version 2 1","year":"0","key":"38"},{"key":"12","doi-asserted-by":"crossref","first-page":"2372","DOI":"10.1109\/INFCOM.2005.1498523","article-title":"The design and implementation ofNetwork puzzles","author":"feng","year":"2005","journal-title":"Proc Annual Joint Conf OfIEEE Computer and Communications Societies INFOCOM"},{"journal-title":"What Is the U S Average Internet Speed ?","year":"0","key":"21"},{"key":"20","article-title":"Mapping local internet control","author":"roberts","year":"2011","journal-title":"Berkman Center for Internet &Society at Harvard University"},{"journal-title":"AS2-IPv6 BGP Table Statistics","year":"0","key":"41"},{"journal-title":"Memory OfBGP Table-The Cisco Learning Network","year":"0","key":"40"},{"key":"22","doi-asserted-by":"crossref","DOI":"10.1145\/1167838.1167839","article-title":"Addressing intra-Domain network security issues through secure link-State routing protocol a new architectural Framework","author":"huang","year":"2006","journal-title":"Accepted by Communications of the ACM"},{"key":"23","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1109\/ICCCN.1998.998771","article-title":"On the vulnerabilities and protection of oSPF routing protocol","author":"wang","year":"1998","journal-title":"Proceedings of the International Conference on Computer Communications and Networks"},{"journal-title":"OSPF Security Vulnerabilities Analysis","year":"0","author":"jones","key":"24"},{"key":"25","doi-asserted-by":"crossref","first-page":"96","DOI":"10.4156\/jnit.vol1.issue3.11","article-title":"Evaluation ofPrefix hijacking impact based on hinge-Transmit property ofBGP routing system","volume":"1","author":"yujing liu","year":"2010","journal-title":"JNIT"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997152"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2000.824939"},{"journal-title":"BGP\/ASN Analysis Report","year":"0","key":"28"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71617-4_1"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258660"},{"journal-title":"Introductions to ISP Design Fundamentals","year":"0","key":"2"},{"year":"0","key":"10"},{"journal-title":"Internet Architecture Considerations for Cable ISPs (Session 3303)","year":"0","key":"1"},{"journal-title":"The BGP Instability Report","year":"0","key":"30"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383073"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1402997"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2010.101005"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383073"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1771"},{"key":"4","first-page":"321","article-title":"Perspectives improving sSH-Style host authentication with multi-Path probing","author":"wendlandt","year":"2008","journal-title":"USENIX Annual Technical Conference on Annual Technical Conference Berkeley CA USA 2008"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258660"},{"key":"8","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1145\/347059.347412","article-title":"On network-Aware clustering of web clients","author":"krishnamurthy","year":"2000","journal-title":"Proceedings of the Conference on Applications Technologies Architectures and Protocols for Computer Communication"}],"event":{"name":"2013 8th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2013,12,9]]},"location":"London, United Kingdom","end":{"date-parts":[[2013,12,12]]}},"container-title":["8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745432\/6750143\/06750195.pdf?arnumber=6750195","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T23:35:34Z","timestamp":1648683334000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6750195\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/icitst.2013.6750195","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}