{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T05:24:55Z","timestamp":1750137895136},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/prdc.2004.1276549","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T14:19:45Z","timestamp":1086877185000},"page":"25-34","source":"Crossref","is-referenced-by-count":17,"title":["An algorithmic approach to identifying link failures"],"prefix":"10.1109","author":[{"given":"M.","family":"Lad","sequence":"first","affiliation":[]},{"given":"A.","family":"Nanavati","sequence":"additional","affiliation":[]},{"given":"D.","family":"Massey","sequence":"additional","affiliation":[]},{"family":"Lixia Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.1145\/637201.637231"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1109\/INFCOM.2002.1019307"},{"key":"18","article-title":"A visual exploration process for the analysis of internet routing data","author":"teoh","year":"2003","journal-title":"Proc IEEE Visualization"},{"key":"15","article-title":"A border gateway protocol (BGP-4)","author":"rekhter","year":"1995","journal-title":"Request for Comment (RFC) 1771"},{"year":"0","journal-title":"Routing Information Service Project","key":"16"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/INFCOM.1999.751488"},{"year":"0","journal-title":"The Route Views Project","key":"14"},{"key":"11","article-title":"Link-rank: A graphical tool for capturing BGP routing dynamics","author":"lad","year":"2003","journal-title":"UCLA CSD Technical Report"},{"key":"12","article-title":"Analysis of BGP update surge during Slammer attack","author":"lad","year":"2003","journal-title":"Proceedings of 5th International Workshop on Distributed Computing"},{"year":"0","author":"m","journal-title":"The Spread of the Sapphire\/Slammer Worm","key":"3"},{"key":"2","article-title":"Global routing instabilities triggered by Code Red II and Nimda worm attacks","author":"cowie","year":"2001","journal-title":"Technical Report"},{"year":"0","journal-title":"\"Code Red\" Worm Exploiting Buffer Overflow in US Indexing Service DLL","key":"1"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1145\/316194.316231"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/INFCOM.1997.644557"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1145\/773153.773168"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1109\/90.974527"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1145\/316188.316229","article-title":"On power-law relationships of the internet topology","author":"faloutsos","year":"1999","journal-title":"Proc ACM SIGCOMM 99"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/INFCOM.2000.832222"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/INFCOM.2000.832534"}],"event":{"name":"10th IEEE Pacific Rim International Symposium on Dependable Computing, 2004.","location":"Papeete, Tahiti, French Polynesia"},"container-title":["10th IEEE Pacific Rim International Symposium on Dependable Computing, 2004. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8995\/28541\/01276549.pdf?arnumber=1276549","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T07:56:22Z","timestamp":1497599782000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1276549\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/prdc.2004.1276549","relation":{},"subject":[]}}