{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T03:12:51Z","timestamp":1769829171267,"version":"3.49.0"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1109\/noms.2008.4575169","type":"proceedings-article","created":{"date-parts":[[2008,9,16]],"date-time":"2008-09-16T19:17:28Z","timestamp":1221592648000},"page":"465-472","source":"Crossref","is-referenced-by-count":21,"title":["Detecting BGP anomalies with wavelet"],"prefix":"10.1109","author":[{"given":"Jianning","family":"Mai","sequence":"first","affiliation":[]},{"given":"Lihua","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Chen-Nee","family":"Chuah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","DOI":"10.1109\/SP.2007.7","article-title":"accurate real-time identification of ip prefix hijacking","author":"hu","year":"2007","journal-title":"Proc 2007 IEEE Symposium on Security and Privacy"},{"key":"35","article-title":"realistic bgp traffic for test labs","author":"maennel","year":"2002","journal-title":"Proc of the 2002 ACM SIGCOMM Conference"},{"key":"17","article-title":"phas: a prefix hijack alert system","author":"lad","year":"2006","journal-title":"Proc 15th USENIX Security Symposium (Security 06)"},{"key":"36","author":"percival","year":"2004","journal-title":"Wavelet Methods for Time Series Analysis"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/NPSEC.2006.320341"},{"key":"33","article-title":"seurat: a pointillist approach to anomaly detection","author":"xie","year":"0","journal-title":"Proc 7th Int Symp Recent Advances in Intrusion Detection (RAID)"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1080173.1080188"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.814797"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505207"},{"key":"13","author":"mortier","year":"0"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/18.650984"},{"key":"37","year":"0","journal-title":"Nanog mailing list"},{"key":"11","year":"0","journal-title":"RIPE (Reeaux IP Europeens)"},{"key":"12","author":"meyer","year":"0","journal-title":"University of Oregon Route Views Project"},{"key":"21","article-title":"visual-based anomaly detection for bgp origin as change (oasc) events","volume":"2867","author":"teoh","year":"2003","journal-title":"Proc IEEE\/IFIP Distributed Systems Operations and Management Workshop"},{"key":"20","article-title":"information visualization for anomaly detection","author":"teoh","year":"2002","journal-title":"Proceedings of 5th IASTED International Conference in Computer Graphics and Imaging (CGIM)"},{"key":"22","article-title":"on detection of anomalous routing dynamics in bgp","author":"zhang","year":"2004","journal-title":"Proc IFIP Networking"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1080173.1080189"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/1080173.1080187"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/BROADNETS.2006.4374397"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/1254882.1254890"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/90.282603"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/90.650143"},{"key":"29","author":"yuan","year":"2004","journal-title":"BGP Anomaly Detection Using Wavelet Analysis"},{"key":"3","year":"0"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00108-5"},{"key":"10","article-title":"finding a needle in a haystack: pinpointing significant bgp routing changes in an ip network","author":"wu","year":"2005","journal-title":"NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation"},{"key":"1","doi-asserted-by":"crossref","DOI":"10.1145\/263109.263151","article-title":"internet routing instability","author":"labovitz","year":"1997","journal-title":"Proc ACM Sigcomm"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71617-4_1"},{"key":"7","article-title":"an analysis of the med oscillation problem in bgp","author":"griffin","year":"2003","journal-title":"ICNP"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/633026.633027"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637210"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.1145\/964725.633048","article-title":"route oscillations in i-bgp with route reflection","author":"basu","year":"2002","journal-title":"Proc ACM Sigcomm"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1049\/ip-com:20010659"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637231"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015491"},{"key":"8","article-title":"analysis of bgp update burst during slammer attack","author":"lad","year":"2003","journal-title":"6th Int Workshop on Distributed Computing"}],"event":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","location":"Salvador, Bahia, Brazil","start":{"date-parts":[[2008,4,7]]},"end":{"date-parts":[[2008,4,11]]}},"container-title":["NOMS 2008 - 2008 IEEE Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4567164\/4575087\/04575169.pdf?arnumber=4575169","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T11:46:36Z","timestamp":1497786396000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4575169\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/noms.2008.4575169","relation":{},"subject":[],"published":{"date-parts":[[2008]]}}}