{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T05:24:56Z","timestamp":1750137896881},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/visual.2003.1250415","type":"proceedings-article","created":{"date-parts":[[2004,3,2]],"date-time":"2004-03-02T02:26:50Z","timestamp":1078194410000},"page":"523-530","source":"Crossref","is-referenced-by-count":17,"title":["A visual exploration process for the analysis of Internet routing data"],"prefix":"10.1109","author":[{"family":"Soon Tee Teoh","sequence":"first","affiliation":[]},{"family":"Kwan-Liu Ma","sequence":"additional","affiliation":[]},{"given":"S.F.","family":"Wu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Otter: A General-Purpose Network Visualization Tool","author":"huffaker","year":"1999","journal-title":"Proc INET 99"},{"journal-title":"IETF - Internet Engineering Task Force","year":"0","key":"ref11"},{"journal-title":"Route Views Project","year":"0","author":"myer","key":"ref12"},{"key":"ref13","article-title":"Improving BGP Convergence through Consistency Assertions","author":"pel","year":"2002","journal-title":"Proc IEEE InfoCom"},{"key":"ref14","article-title":"A Border Gateway Protocol 4 (BGP-4)","author":"rekhter","year":"1995","journal-title":"RFC 1771"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/168642.168652"},{"key":"ref16","first-page":"505","article-title":"Case Study: Interactive Visualization for Internet Security","author":"teoh","year":"2002","journal-title":"Proc IEEE Visualization"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1080\/10618600.1994.10474635"},{"key":"ref3","article-title":"Mapping and Visualizing the Internet","author":"cheswick","year":"2000","journal-title":"USENIX 2000 Annu Techn Conf"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/339331.339426"},{"key":"ref5","article-title":"Network Visualization with NAM, the VINT Network Administrator","author":"estrin","year":"1999","journal-title":"Tech Report 99&#x2013;703"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1145\/316194.316231","article-title":"An Analysis of BGP Convergence Properties","author":"griffin","year":"1999","journal-title":"Proc ACM SIGCOMM 277&#x2013;288"},{"key":"ref7","first-page":"19","article-title":"An Eye on Network Intruder-Administrator Shootouts","author":"girardin","year":"1999","journal-title":"J Usenix Assoc"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/108844.108874"},{"journal-title":"CAIDA The Cooperative Association for Internet Data Analysis","year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832222"}],"event":{"name":"IEEE Visualization 2003","acronym":"VISUAL-03","location":"Seattle, WA, USA"},"container-title":["IEEE Transactions on Ultrasonics, Ferroelectrics and Frequency Control"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8844\/27978\/01250415.pdf?arnumber=1250415","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T04:05:52Z","timestamp":1497585952000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1250415\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/visual.2003.1250415","relation":{},"subject":[]}}