{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T11:13:46Z","timestamp":1726485226584},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,3]]},"DOI":"10.1109\/infcom.2010.5462200","type":"proceedings-article","created":{"date-parts":[[2010,5,12]],"date-time":"2010-05-12T16:54:40Z","timestamp":1273683280000},"page":"1-5","source":"Crossref","is-referenced-by-count":3,"title":["Safeguarding Data Delivery by Decoupling Path Propagation and Adoption"],"prefix":"10.1109","author":[{"given":"Mingui","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Bin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Beichuan","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/1282380.1282412"},{"year":"0","journal-title":"Prefix hijack by ASN 8997","key":"ref11"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/ICNP.2006.320179"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/1364654.1364658"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1016\/j.comnet.2008.06.012"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/637201.637232"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1145\/1180405.1180442"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/GLOCOM.2005.1577767"},{"year":"0","journal-title":"SSFNet","key":"ref18"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/INFOCOM.2008.303"},{"key":"ref4","first-page":"153","article-title":"PHAS: A Prefix Hijack Alert System","author":"lad","year":"2006","journal-title":"15th USENIX Security Symposium"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/1452335.1452337"},{"year":"0","key":"ref6"},{"year":"0","journal-title":"Ripe myasn system","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/INFCOM.2007.151"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/1402958.1402996"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/1282380.1282411"},{"key":"ref9","article-title":"Dection of Invalid Routing Announcement in the Internet","author":"zhao","year":"2002","journal-title":"Proc IEEE DSN"},{"year":"0","key":"ref1"},{"year":"0","journal-title":"University of Oregon Route Views Project","key":"ref20"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/49.839934"},{"year":"2008","author":"oliveira","journal-title":"Quantifying the Completeness of the Observed Internet AS-level Structure","key":"ref21"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1145\/1015467.1015488"},{"year":"2004","author":"ng","journal-title":"Extensions to BGP to Support Secure Origin BGP","key":"ref23"},{"key":"ref26","first-page":"17","article-title":"Topology-based Detection of Anomalous BGP Messages","author":"kruegel","year":"2003","journal-title":"Proceedings of RAID"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/SECCOM.2007.4550358"}],"event":{"name":"IEEE INFOCOM 2010 - IEEE Conference on Computer Communications","start":{"date-parts":[[2010,3,14]]},"location":"San Diego, CA, USA","end":{"date-parts":[[2010,3,19]]}},"container-title":["2010 Proceedings IEEE INFOCOM"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5461675\/5461899\/05462200.pdf?arnumber=5462200","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T21:06:04Z","timestamp":1489871164000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5462200\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/infcom.2010.5462200","relation":{},"subject":[],"published":{"date-parts":[[2010,3]]}}}