{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T05:26:31Z","timestamp":1750137991275,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/vizsec.2018.8709182","type":"proceedings-article","created":{"date-parts":[[2019,5,9]],"date-time":"2019-05-09T22:11:43Z","timestamp":1557439903000},"page":"1-8","source":"Crossref","is-referenced-by-count":11,"title":["Visual-Interactive Identification of Anomalous IP-Block Behavior Using Geo-IP Data"],"prefix":"10.1109","author":[{"given":"Alex","family":"Ulmer","sequence":"first","affiliation":[{"name":"Fraunhofer IGD, Technische Universit\u00e4t Darmstadt, Germany"}]},{"given":"Marija","family":"Schufrin","sequence":"additional","affiliation":[{"name":"Fraunhofer IGD, Technische Universit\u00e4t Darmstadt, Germany"}]},{"given":"David","family":"Sessler","sequence":"additional","affiliation":[{"name":"Fraunhofer IGD, Technische Universit\u00e4t Darmstadt, Germany"}]},{"given":"Jorn","family":"Kohlhammer","sequence":"additional","affiliation":[{"name":"Fraunhofer IGD, Technische Universit\u00e4t Darmstadt, Germany"}]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567184"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.5220\/0006126702090216"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2009.2034031"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"117","DOI":"10.7155\/jgaa.00102","article-title":"Visualizing interdomain routing with bgplay","volume":"9","author":"colitti","year":"2005","journal-title":"J Graph Algorithms Appl"},{"journal-title":"Deutsche Telekom AG","year":"0","key":"ref12"},{"journal-title":"Journal of Elasticity","year":"2018","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2379690.2379701"},{"journal-title":"Digital Attack Map","year":"2013","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.7"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(08)70065-4"},{"journal-title":"Cyberthreat map","year":"2018","key":"ref18"},{"year":"2018","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1179576.1179593"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2012.6375891"},{"journal-title":"Elisha A visual-based anomaly detection system for the bgp routing protocol","year":"0","author":"teoh","key":"ref27"},{"key":"ref3","first-page":"114","article-title":"Determining what individual sus scores mean: Adding an adjective rating scale","volume":"4","author":"bangor","year":"2009","journal-title":"Journal of Usability Studies"},{"key":"ref6","article-title":"How prevalent is prefix hijacking on the internet","author":"boothe","year":"2006","journal-title":"NANOG36 Talk"},{"journal-title":"Hijack event today by Indosat","year":"2014","author":"toonk","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/503457.503459"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2011.185"},{"journal-title":"Short-lived prefix hijacking on the internet","year":"2006","author":"boothe","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282411"},{"key":"ref9","first-page":"29","article-title":"Sus: a retrospective","volume":"8","author":"brooke","year":"2013","journal-title":"Journal of Usability Studies"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2622240"},{"journal-title":"React components that implement Google&#x2019;s Material Design","year":"2018","key":"ref20"},{"year":"2018","key":"ref22"},{"journal-title":"MaxMind GeoIP Database","year":"2018","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159947"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.2013.6622756"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398779"},{"year":"2018","key":"ref25"}],"event":{"name":"2018 IEEE Symposium on Visualization for Cyber Security (VizSec)","start":{"date-parts":[[2018,10,22]]},"location":"Berlin, Germany","end":{"date-parts":[[2018,10,22]]}},"container-title":["2018 IEEE Symposium on Visualization for Cyber Security (VizSec)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8706256\/8709176\/08709182.pdf?arnumber=8709182","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,9]],"date-time":"2021-06-09T06:16:21Z","timestamp":1623219381000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8709182\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/vizsec.2018.8709182","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}