{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T02:13:26Z","timestamp":1773713606744,"version":"3.50.1"},"reference-count":62,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U24B20128"],"award-info":[{"award-number":["U24B20128"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62225201"],"award-info":[{"award-number":["62225201"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202021"],"award-info":[{"award-number":["62202021"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62422201"],"award-info":[{"award-number":["62422201"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62271019"],"award-info":[{"award-number":["62271019"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key R&#x0026;D Program of China","award":["2022YFB4501000"],"award-info":[{"award-number":["2022YFB4501000"]}]},{"name":"National Key R&#x0026;D Program of China","award":["ANT2024003"],"award-info":[{"award-number":["ANT2024003"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1109\/tdsc.2025.3643435","type":"journal-article","created":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T18:38:22Z","timestamp":1765564702000},"page":"4177-4194","source":"Crossref","is-referenced-by-count":0,"title":["AS-Level Topology Inference for Path-Aware Networking"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-3058-0125","authenticated-orcid":false,"given":"Yuxin","family":"Mao","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6807-512X","authenticated-orcid":false,"given":"Hongbin","family":"Luo","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1966-2421","authenticated-orcid":false,"given":"Zhiyuan","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0978-3414","authenticated-orcid":false,"given":"Shan","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University, Beijing, China"}]}],"member":"263","reference":[{"key":"ref2","article-title":"Off by default!","volume-title":"Proc. Workshop Hot Topics Networks (Hotnets)","author":"Ballani","year":"2005"},{"key":"ref3","article-title":"Network capabilities: The good, the bad and the ugly","volume":"139","author":"Argyraki","year":"2005","journal-title":"ACM HotNets-IV"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2874896"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3061486"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-019-04237-1"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.23919\/APNOMS56106.2022.9919997"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.23080"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3603269.3610840"},{"key":"ref10","article-title":"DDoS attack trends for Q1\u2013Q2 2024: Insights from Gcore radar report","year":"2025"},{"key":"ref11","article-title":"DDoS threat report for 2024 Q2","year":"2025"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2381873"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.08.012"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ton.2025.3578240"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3392486"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/11373.001.0001"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2002250.2002256"},{"key":"ref18","first-page":"309","article-title":"$\\lbrace${XIA$\\rbrace$}: Efficient support for evolvable internetworking","volume-title":"Proc. 9th USENIX Symp. Networked Syst. Des. Implementation","author":"Han","year":"2012"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3085591"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342075"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8986"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2014.6843226"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2024.3498042"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2024.3384452"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3622069"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.17487\/RFC9049"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1594977.1592583"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3036826"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2018.022021673"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-05288-0"},{"key":"ref31","first-page":"541","article-title":"$\\lbrace${EPIC $\\rbrace$}: Every packet is checked in the data plane of a $\\lbrace${ Path-Aware$\\rbrace$} internet","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Legner","year":"2020"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3147511"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2688414"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2018.2800007"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2025.3586626"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2025.3575920"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2023.3336661"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2024.3384552"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM52122.2024.10621082"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM52122.2024.10621312"},{"key":"ref41","first-page":"131","article-title":"Revisiting congestion control for lossless ethernet","volume-title":"Proc. 21st USENIX Symp. Netw. Syst. Des. Implementation","author":"Zhang","year":"2024"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2023.3250484"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.06.007"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1504\/IJAIP.2024.141525"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/347059.347560"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498364"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.04.014"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CommNet52204.2021.9641969"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/SysCon48628.2021.9447126"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC52172.2021.9615716"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1117\/12.3024751"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/964723.383060"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301319"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.12.011"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3074086"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2024.3463609"},{"key":"ref57","article-title":"What\u2019s (not) validating network paths: A survey","author":"Bu","year":"2018"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TON.2024.3524092"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1117\/12.434393"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064256"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423619"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.2140\/pjm.1960.10.1181"},{"key":"ref63","article-title":"The CAIDA AS relationships dataset","year":"2024"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/11434575\/11298534.pdf?arnumber=11298534","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T01:16:38Z","timestamp":1773710198000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11298534\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3]]},"references-count":62,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2025.3643435","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3]]}}}