{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T15:46:35Z","timestamp":1742399195909},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1109\/infcom.2013.6567184","type":"proceedings-article","created":{"date-parts":[[2013,8,1]],"date-time":"2013-08-01T20:12:57Z","timestamp":1375387977000},"page":"3477-3482","source":"Crossref","is-referenced-by-count":5,"title":["SpamTracer: How stealthy are spammers?"],"prefix":"10.1109","author":[{"given":"Pierre-Antoine","family":"Vervier","sequence":"first","affiliation":[]},{"given":"Olivier","family":"Thonnard","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Team Cymru IP to ASN","year":"0","key":"19"},{"journal-title":"University of Oregon RouteViews Project","year":"0","key":"17"},{"journal-title":"Maxmind","year":"0","key":"18"},{"journal-title":"IPlane An Information Plane for Distributed Service","year":"0","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.111006"},{"key":"13","first-page":"2","article-title":"Securing the border gateway protocol: A status update","author":"kent","year":"2003","journal-title":"Seventh IFIP TC-6 TC-11 Conference on Communications and Multimedia Security"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398779"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88623-5_40"},{"journal-title":"The RPKI and Origin Validation","year":"2009","author":"bush","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505207"},{"journal-title":"Team Cymru IPv4 Fullbogons","year":"0","key":"20"},{"journal-title":"Internet Topology Collection","year":"0","key":"22"},{"journal-title":"IRR net","year":"0","key":"23"},{"journal-title":"Huricane Electric Internet Services","year":"0","key":"24"},{"journal-title":"Ripestat","year":"0","key":"25"},{"journal-title":"NANOG (North American Network Operators' Group)","year":"0","key":"26"},{"journal-title":"Prefix Hijacking by Michael Lindsay Via Internap","year":"2011","key":"27"},{"journal-title":"Case Study-Beware of Fly-by Spammers","year":"2012","key":"28"},{"key":"3","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1145\/1159913.1159947","article-title":"Understanding the network-level behavior of spammers","author":"ramachandran","year":"2006","journal-title":"SIGCOMM '06 Proceedings of the 2006 conference on Applications technologies architectures and protocols for computer communications"},{"journal-title":"Pakistan hijacks YouTube","year":"0","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOM.2007.4550358"},{"key":"1","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/SP.2007.7","article-title":"Accurate real-time identification of ip prefix hijacking","author":"hu","year":"2007","journal-title":"Proceedings of the 2007 IEEE Symposium on Security and Privacy Ser SP '07"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282411"},{"key":"6","article-title":"PHAS: A prefix hijack alert system","author":"lad","year":"2006","journal-title":"Proc Usenix Security Symposium"},{"journal-title":"Symantec's Worldwide Intelligence Network Environment (WINE)","year":"0","key":"5"},{"journal-title":"Symantec Cloud","year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282412"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2066284"}],"event":{"name":"IEEE INFOCOM 2013 - IEEE Conference on Computer Communications","start":{"date-parts":[[2013,4,14]]},"location":"Turin, Italy","end":{"date-parts":[[2013,4,19]]}},"container-title":["2013 Proceedings IEEE INFOCOM"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6556116\/6566708\/06567184.pdf?arnumber=6567184","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T17:14:47Z","timestamp":1498065287000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6567184\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/infcom.2013.6567184","relation":{},"subject":[],"published":{"date-parts":[[2013,4]]}}}