{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T18:05:25Z","timestamp":1745863525878,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1109\/ipdps.2006.1639679","type":"proceedings-article","created":{"date-parts":[[2006,7,10]],"date-time":"2006-07-10T15:59:56Z","timestamp":1152547196000},"page":"8 pp.","source":"Crossref","is-referenced-by-count":3,"title":["Analysis of BGP prefix origins during Google's May 2005 outage"],"prefix":"10.1109","author":[{"family":"Tao Wan","sequence":"first","affiliation":[]},{"given":"P.C.","family":"van Oorschot","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2005","author":"wan","key":"19"},{"journal-title":"RouteViews Route Views Project","year":"2005","key":"17"},{"journal-title":"Possible DNS Hack Knocks","year":"2005","author":"thomson","key":"18"},{"year":"0","key":"15"},{"year":"0","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1546"},{"article-title":"Network Layer Protocols with Byzantine Robustness","year":"1988","author":"perlman","key":"14"},{"journal-title":"Om Malik's Broadband Blog","year":"2005","author":"malik","key":"11"},{"year":"0","key":"12"},{"year":"0","author":"wan","key":"21"},{"year":"0","author":"wan","key":"20"},{"year":"2005","author":"wan","key":"22"},{"journal-title":"Technology","year":"0","author":"wan","key":"23"},{"key":"24","article-title":"Pretty Secure BGP (psBGP)","author":"wan","year":"2005","journal-title":"Internet Society Proceedings of the Symposium on Network and Distributed Systems Security (NDSS'05)"},{"key":"25","first-page":"15","article-title":"Securing BGP Through Secure Origin BGP","volume":"6","author":"white","year":"2003","journal-title":"The Internet Protocol Journal"},{"year":"0","key":"26"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505207"},{"journal-title":"Routing Security","year":"2003","author":"bellovin","key":"3"},{"journal-title":"Security Problems in the TCP\/IP Protocol Suite","year":"1989","author":"bellovin","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/49.839934"},{"journal-title":"American Registry of Internet","year":"2005","key":"1"},{"journal-title":"Problems","year":"2005","author":"ferguson","key":"7"},{"year":"0","key":"6"},{"key":"5","article-title":"Authentication, and Privacy","volume":"47","author":"bellovin","year":"2004","journal-title":"Communications of the ACM (Inside Risks)"},{"key":"4","volume":"28","author":"bellovin","year":"2003","journal-title":"Where the Wild Things Are BGP Threats"},{"year":"0","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1930"}],"event":{"name":"Proceedings 20th IEEE International Parallel & Distributed Processing Symposium","start":{"date-parts":[[2006,4,25]]},"location":"Rhodes Island, Greece","end":{"date-parts":[[2006,4,29]]}},"container-title":["Proceedings 20th IEEE International Parallel &amp; Distributed Processing Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10917\/34366\/01639679.pdf?arnumber=1639679","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T13:46:13Z","timestamp":1489499173000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1639679\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/ipdps.2006.1639679","relation":{},"subject":[],"published":{"date-parts":[[2006]]}}}