{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T10:59:14Z","timestamp":1760785154368,"version":"3.37.3"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,7,9]],"date-time":"2023-07-09T00:00:00Z","timestamp":1688860800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,9]],"date-time":"2023-07-09T00:00:00Z","timestamp":1688860800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020YFE0200500"],"award-info":[{"award-number":["2020YFE0200500"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,7,9]]},"DOI":"10.1109\/iscc58397.2023.10218104","type":"proceedings-article","created":{"date-parts":[[2023,8,28]],"date-time":"2023-08-28T17:46:48Z","timestamp":1693244808000},"page":"656-662","source":"Crossref","is-referenced-by-count":1,"title":["Metis: Detecting Fake AS-PATHs Based on Link Prediction"],"prefix":"10.1109","author":[{"given":"Chengwan","family":"Zhang","sequence":"first","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University,China"}]},{"given":"Congcong","family":"Miao","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University,China"}]},{"given":"Changqing","family":"An","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University,China"}]},{"given":"Anlun","family":"Hong","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University,China"}]},{"given":"Ning","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute for Communication Systems, University of Surrey,UK"}]},{"given":"Zhiquan","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University,China"}]},{"given":"Jilong","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1654"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505207"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398779"},{"volume-title":"bgpmon","year":"2021","key":"ref4"},{"volume-title":"Bgpwatch","year":"2021","key":"ref5"},{"volume-title":"Youtube hijacking: A ripe ncc ris case study","year":"2008","key":"ref6"},{"volume-title":"Chinese isp hijacks the internet","year":"2010","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282411"},{"volume-title":"How 3 hours of inaction from amazon cost cryptocurrency holders $235,000","year":"2021","key":"ref9"},{"key":"ref10","first-page":"4509","article-title":"Themis: Accelerating the detection of route origin hijacking by distinguishing legitimate and illegitimate MOAS","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Qin","year":"2022"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2869798"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.7"},{"issue":"2","key":"ref13","first-page":"3","article-title":"Phas: A prefix hijack alert system","volume-title":"USENIX Security symposium","volume":"1","author":"Lad","year":"2006"},{"volume-title":"Bgp hijacks observatory","year":"2021","key":"ref14"},{"volume-title":"The caida as relationships dataset, <1998\u20132022>","year":"2021","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24240"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2010.11.027"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987482"},{"key":"ref19","article-title":"Link prediction based on graph neural networks","volume":"31","author":"Zhang","year":"2018","journal-title":"Advances in neural information processing systems"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11782"},{"volume-title":"Special-purpose as numbers","year":"2021","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/90.974527"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.23919\/TMA.2019.8784511"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS54207.2022.9789897"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796874"}],"event":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2023,7,9]]},"location":"Gammarth, Tunisia","end":{"date-parts":[[2023,7,12]]}},"container-title":["2023 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10217219\/10217829\/10218104.pdf?arnumber=10218104","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T00:54:43Z","timestamp":1705020883000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10218104\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,9]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/iscc58397.2023.10218104","relation":{},"subject":[],"published":{"date-parts":[[2023,7,9]]}}}