{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:07:42Z","timestamp":1725574062435},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1109\/infcomw.2013.6562916","type":"proceedings-article","created":{"date-parts":[[2013,7,25]],"date-time":"2013-07-25T19:34:09Z","timestamp":1374780849000},"page":"453-458","source":"Crossref","is-referenced-by-count":2,"title":["SpamTracer: How stealthy are spammers?"],"prefix":"10.1109","author":[{"given":"Pierre-Antoine","family":"Vervier","sequence":"first","affiliation":[]},{"given":"Olivier","family":"Thonnard","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Team Cymru IP to ASN","year":"0","key":"19"},{"year":"0","key":"17"},{"journal-title":"Maxmind","year":"0","key":"18"},{"journal-title":"IPlane An Information Plane for Distributed Service","year":"0","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.111006"},{"key":"13","first-page":"2","article-title":"Securing the border gateway protocol: A status update","author":"kent","year":"2003","journal-title":"Seventh IFIP TC-6 TC-11 Conference on Communications and Multimedia Security"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398779"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88623-5_40"},{"journal-title":"The RPKI and Origin Validation","year":"2009","author":"bush","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505207"},{"journal-title":"Team Cymru IPv4 Fullbogons","year":"0","key":"20"},{"journal-title":"Internet Topology Collection","year":"0","key":"22"},{"journal-title":"IRR net","year":"0","key":"23"},{"journal-title":"Huricane Electric Internet Services","year":"0","key":"24"},{"journal-title":"Ripestat","year":"0","key":"25"},{"journal-title":"NANOG (North American Network Operators' Group)","year":"0","key":"26"},{"journal-title":"Prefix Hijacking by Michael Lindsay Via Internap","year":"2011","key":"27"},{"journal-title":"Fly-by Spammers","article-title":"Symantec internet security threat report: Future spam trends: bgp hijacking. case study-beware of","year":"2012","key":"28"},{"key":"3","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1145\/1159913.1159947","article-title":"Understanding the network-level behavior of spammers","author":"ramachandran","year":"2006","journal-title":"SIGCOMM '06 Proceedings of the 2006 conference on Applications technologies architectures and protocols for computer communications"},{"journal-title":"Pakistan hijacks YouTube","year":"0","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOM.2007.4550358"},{"key":"1","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/SP.2007.7","article-title":"Accurate real-time identification of ip prefix hijacking","author":"hu","year":"2007","journal-title":"Proceedings of the 2007 IEEE Symposium on Security and Privacy Ser SP '07"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282411"},{"key":"6","article-title":"PHAS: A prefix hijack alert system","author":"lad","year":"2006","journal-title":"Proc Usenix Security Symposium"},{"journal-title":"Symantec's Worldwide Intelligence Network Environment (WINE)","year":"0","key":"5"},{"journal-title":"Symantec Cloud","year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282412"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2066284"}],"event":{"name":"2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","start":{"date-parts":[[2013,4,14]]},"location":"Turin","end":{"date-parts":[[2013,4,19]]}},"container-title":["2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6556114\/6562841\/06562916.pdf?arnumber=6562916","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T16:50:46Z","timestamp":1498063846000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6562916\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/infcomw.2013.6562916","relation":{},"subject":[],"published":{"date-parts":[[2013,4]]}}}