{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T08:54:32Z","timestamp":1767084872820,"version":"3.37.3"},"reference-count":91,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1320977","CNS- 1717187","CNS-1719165"],"award-info":[{"award-number":["CNS-1320977","CNS- 1717187","CNS-1719165"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/tnet.2019.2940369","type":"journal-article","created":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T19:32:02Z","timestamp":1570131122000},"page":"2056-2070","source":"Crossref","is-referenced-by-count":23,"title":["On Mapping the Interconnections in Today\u2019s Internet"],"prefix":"10.1109","volume":"27","author":[{"given":"Reza","family":"Motamedi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9555-1889","authenticated-orcid":false,"given":"Bahador","family":"Yeganeh","sequence":"additional","affiliation":[]},{"given":"Balakrishnan","family":"Chandrasekaran","sequence":"additional","affiliation":[]},{"given":"Reza","family":"Rejaie","sequence":"additional","affiliation":[]},{"given":"Bruce M.","family":"Maggs","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1384-8188","authenticated-orcid":false,"given":"Walter","family":"Willinger","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04918-2_5"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.06.017"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863996"},{"journal-title":"EdgeScape Service Description","year":"2017","key":"ref70"},{"journal-title":"AS Relationships&#x2014;With Geographic Annotations","year":"2018","key":"ref76"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2014227"},{"journal-title":"IP to ASN mapping","year":"2016","key":"ref74"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/964725.633039"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2756888"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2716281.2836125"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1812"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879188"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30505-9_26"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504746"},{"key":"ref31","first-page":"1","article-title":"Dasu: Pushing experiments to the Internet&#x2019;s edge","author":"s\u00e1nchez","year":"2013","journal-title":"Proc USENIX NSDI"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2377677.2377714"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12334-4_11"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658964"},{"key":"ref35","first-page":"1605","article-title":"Scalable and accurate identification of AS-level forwarding paths","author":"mao","year":"2004","journal-title":"Proc IEEE InfoCom"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948207"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787499"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.2307\/4140796"},{"key":"ref61","first-page":"138","article-title":"Excavating the material geographies of cybercities","author":"graham","year":"2004","journal-title":"The Cybercities Reader"},{"key":"ref63","article-title":"11 Internet networks of world cities: Agglomeration and dispersion","author":"malecki","year":"2012","journal-title":"International Handbook of Globalization and World Cities"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24693-0_24"},{"journal-title":"Carrier List","year":"2015","key":"ref64"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230576"},{"journal-title":"Exchange Points List","year":"2016","key":"ref65"},{"journal-title":"BGP Looking Glass Database","year":"2017","key":"ref66"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644934"},{"journal-title":"RIPE RIS","year":"2017","key":"ref67"},{"journal-title":"GeoIP","year":"2016","key":"ref68"},{"journal-title":"IP2Location DB9","year":"2015","key":"ref69"},{"journal-title":"THE CORESITE OPEN CLOUD EXCHANGE&#x2014;One Connection Countless Cloud Options","year":"2018","key":"ref2"},{"journal-title":"Cloud Exchange","year":"2017","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2007.4444750"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2376520"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2008.4564479"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2020798"},{"article-title":"Quantifying the completeness of the observed Internet AS-level structure","year":"2008","author":"oliveira","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098853"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098854"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.886332"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/1971162.1971171"},{"journal-title":"MAP-IT","year":"2017","author":"marder","key":"ref91"},{"journal-title":"Cloud Adoption Trends Favor Public Cloud With a Hybrid Twist","year":"2016","key":"ref90"},{"key":"ref59","article-title":"Discriminative probabilistic models for relational data","author":"taskar","year":"2002","journal-title":"Proc 18th Conf Uncertainty Artif Intell"},{"journal-title":"Graph-Based Spam\/Fraud Detection Algorithms and Apps","year":"2012","author":"akoglu","key":"ref58"},{"key":"ref57","first-page":"1","article-title":"Opinion fraud detection in online reviews by network effects","author":"akoglu","year":"2013","journal-title":"Proc ICWSM"},{"key":"ref56","first-page":"201","article-title":"Netprobe: A fast and scalable system for fraud detection in online auction networks","author":"pandit","year":"2007","journal-title":"Proc WWW"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2005.853423"},{"key":"ref54","first-page":"239","article-title":"Understanding belief propagation and its generalizations","author":"yedidia","year":"2003","journal-title":"Exploring Artificial Intelligence in the New Millennium"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278556"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2675013"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230549"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2535372.2535390"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2006.254770"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987467"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987468"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278538"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2716281.2836122"},{"journal-title":"AS Rank AS Ranking","year":"2016","key":"ref82"},{"article-title":"An organization-level view of the Internet and its implications (extended)","year":"2012","author":"cai","key":"ref16"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/2541468.2541473"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2119327"},{"journal-title":"Investor Presentation","year":"2015","key":"ref84"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.111006"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/11871637_14"},{"key":"ref19","article-title":"Internet topology research redux","volume":"1","author":"willinger","year":"2013","journal-title":"Recent advances in networking"},{"journal-title":"AS Relationships","year":"2016","key":"ref80"},{"key":"ref89","doi-asserted-by":"crossref","DOI":"10.1145\/3355369.3355602","article-title":"How cloud traffic goes hiding: A study of Amazon&#x2019;s peering fabric","author":"yeganeh","year":"2019","journal-title":"Proc Internet Meas Conf (IMC)"},{"journal-title":"Cloud Interconnect","year":"2018","key":"ref4"},{"journal-title":"AWS Direct Connect","year":"2018","key":"ref3"},{"key":"ref6","first-page":"1","article-title":"Why do Internet services fail, and what can be done about it?","author":"oppenheimer","year":"2003","journal-title":"Proc USENIX USITS"},{"journal-title":"Networks Security and Complexity The Role of Public Policy in Critical Infrastructure Protection","year":"2005","author":"gorman","key":"ref5"},{"journal-title":"Additional Carrier List","year":"2015","key":"ref85"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131388"},{"journal-title":"CoreSite 3Q 2016 Results&#x2014;Earnings Call Transcripts","year":"2016","key":"ref86"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660299"},{"key":"ref49","first-page":"1","article-title":"How DNS misnaming distorts Internet topology mapping","author":"zhang","year":"2006","journal-title":"Proceedings of USENIX General Track"},{"journal-title":"Edge Cloud Connect","year":"2017","key":"ref87"},{"journal-title":"Equinix Cloud Exchange","year":"2017","key":"ref88"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098855"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663743"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2198887"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330124"},{"key":"ref47","first-page":"313","article-title":"Mapping the expansion of Google&#x2019;s serving infrastructure","author":"calder","year":"2013","journal-title":"Proc ACM IMC"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1402993"},{"key":"ref41","first-page":"337","article-title":"Fixing ally&#x2019;s growing pains with velocity modeling","author":"bender","year":"2008","journal-title":"Proc ACM IMC"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879163"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1672308.1672318"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/90\/8869948\/8856277-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/90\/8869948\/08856277.pdf?arnumber=8856277","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T21:14:53Z","timestamp":1657746893000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8856277\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":91,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tnet.2019.2940369","relation":{},"ISSN":["1063-6692","1558-2566"],"issn-type":[{"type":"print","value":"1063-6692"},{"type":"electronic","value":"1558-2566"}],"subject":[],"published":{"date-parts":[[2019,10]]}}}