{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T17:15:31Z","timestamp":1776791731587,"version":"3.51.2"},"reference-count":44,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T00:00:00Z","timestamp":1651449600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T00:00:00Z","timestamp":1651449600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,2]]},"DOI":"10.1109\/infocom48880.2022.9796874","type":"proceedings-article","created":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T21:18:49Z","timestamp":1655759929000},"page":"1609-1618","source":"Crossref","is-referenced-by-count":5,"title":["Cutting Through the Noise to Infer Autonomous System Topology"],"prefix":"10.1109","author":[{"given":"Kirtus G.","family":"Leyba","sequence":"first","affiliation":[{"name":"Arizona State University,Biodesign Center for Biocomputing, Security and Society,Tempe,AZ,85281"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Joshua J.","family":"Daymude","sequence":"additional","affiliation":[{"name":"Arizona State University,Biodesign Center for Biocomputing, Security and Society,Tempe,AZ,85281"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jean-Gabriel","family":"Young","sequence":"additional","affiliation":[{"name":"University of Vermont,Department of Mathematics and Statistics and Vermont Complex Systems Center,Burlington,VT,05405"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"M. E. J.","family":"Newman","sequence":"additional","affiliation":[{"name":"University of Michigan,Department of Physics and Center for the Study of Complex Systems,Ann Arbor,MI,48109"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jennifer","family":"Rexford","sequence":"additional","affiliation":[{"name":"Princeton University,Department of Computer Science,Princeton,NJ,08540"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Stephanie","family":"Forrest","sequence":"additional","affiliation":[{"name":"Arizona State University,Biodesign Center for Biocomputing, Security and Society,Tempe,AZ,85281"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/956993.957000"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2001.992760"},{"key":"ref33","first-page":"3249","article-title":"Improving the discovery of IXP peering links through passive BGP measurements","author":"giotsas","year":"2013","journal-title":"IEEE Conference on Computer Communications Workshops"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452558"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1093\/comnet\/cnaa046"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2005.1541715"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.21236\/ADA458902"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2019.8845138"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2824809"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.06.012"},{"key":"ref10","first-page":"581","article-title":"Stable and practical AS relationship inference with ProbLink","author":"jin","year":"2019","journal-title":"USENIX Symposium on Networked Systems Design and Implementation"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.09.033"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.98.062321"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1038\/s41567-018-0076-1"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656880"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.09.002"},{"key":"ref15","article-title":"For two hours, a large chunk of European mobile traffic was rerouted through China","author":"cimpanu","year":"2019"},{"key":"ref16","article-title":"Testing mistake triggered Telstra route &#x2018;hijacks&#x2019;","author":"saarinen","year":"2020"},{"key":"ref17","article-title":"Not just another BGP hijack","author":"siddiqui","year":"2020"},{"key":"ref18","first-page":"833","article-title":"Bamboozling certificate authorities with BGP","author":"birge-lee","year":"2018","journal-title":"USENIX Security Symposium"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00032"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987482"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3314344.3332502"},{"key":"ref27","article-title":"Methods to determine node centrality and clustering in graphs with uncertain structure","author":"pfeiffer","year":"2011","journal-title":"AAAI Conference on Weblogs and Social Media"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504735"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2096149.2096155"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815712"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.23919\/CyCon49761.2020.9131726"},{"key":"ref8","article-title":"University of Oregon Route Views Project","year":"0"},{"key":"ref7","article-title":"RIPE NCC Routing Information Service (RIS)","year":"0"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663743"},{"key":"ref9","article-title":"CAIDA AS Rank","year":"0"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1198255.1198259"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1214\/18-EJS1521"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1080\/10618600.2014.951049"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevX.8.041011"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423627"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1126\/science.1087361"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3359989.3365420"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-8733(02)00038-2"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1017\/9781108290159"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-01860-2"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1201\/9781315209661"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-021-24149-x"}],"event":{"name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications","location":"London, United Kingdom","start":{"date-parts":[[2022,5,2]]},"end":{"date-parts":[[2022,5,5]]}},"container-title":["IEEE INFOCOM 2022 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9796607\/9796652\/09796874.pdf?arnumber=9796874","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,11]],"date-time":"2022-07-11T20:01:03Z","timestamp":1657569663000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9796874\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,2]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/infocom48880.2022.9796874","relation":{},"subject":[],"published":{"date-parts":[[2022,5,2]]}}}