{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T13:32:55Z","timestamp":1725715975169},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/nca.2016.7778593","type":"proceedings-article","created":{"date-parts":[[2016,12,13]],"date-time":"2016-12-13T01:48:10Z","timestamp":1481593690000},"page":"52-59","source":"Crossref","is-referenced-by-count":3,"title":["DARSHANA: Detecting route hijacking for communication confidentiality"],"prefix":"10.1109","author":[{"given":"Karan","family":"Balu","sequence":"first","affiliation":[]},{"given":"Miguel L.","family":"Pardal","sequence":"additional","affiliation":[]},{"given":"Miguel","family":"Correia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/2398776.2398779"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/1402958.1402996"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/1282380.1282412"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/JPROC.2009.2034031"},{"year":"2008","author":"brown","journal-title":"Pakistan hijacks YouTube","key":"ref14"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/1282427.1282411"},{"year":"2012","journal-title":"Radio Communication Handbook","key":"ref16"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/1452520.1452557"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/1177080.1177100"},{"year":"0","journal-title":"Team Cymru","key":"ref19"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/49.839934"},{"key":"ref27","article-title":"Studying blackholes in the Internet with hubble","author":"john","year":"2008","journal-title":"Proceedings of NSDI"},{"year":"2016","author":"lepinski","journal-title":"BGPSEC protocol specification draft-ietf-sidr-bgpsec-protocol-17","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/1180405.1180442"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/948109.948133"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/ICNP.2006.320179"},{"key":"ref7","first-page":"153","article-title":"PHAS: A prefix hijack alert system","author":"lad","year":"2006","journal-title":"Proceedings of the USENIX Security Conference"},{"year":"2015","author":"goodin","journal-title":"Hacking Team orchestrated brazen BGP hack to hijack IPs it did not own","key":"ref2"},{"key":"ref9","first-page":"3","article-title":"Accurate Real-time Identification of IP Prefix Hijacking","author":"mao","year":"2007","journal-title":"IEEE Symposium on Security and Privacy"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.17487\/rfc4271"},{"year":"0","journal-title":"Maxmind","key":"ref20"},{"year":"0","journal-title":"Amazon Web Services","key":"ref22"},{"year":"0","journal-title":"Planetlab global research networks that supports the development of new network services","key":"ref21"},{"year":"2010","journal-title":"China 18-minute mystery","key":"ref24"},{"year":"2013","author":"cowie","journal-title":"The new threat Targeted internet traffic misdirection","key":"ref23"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1145\/2785956.2787509"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1145\/505203.505207"}],"event":{"name":"2016 IEEE 15th International Symposium on Network Computing and Applications (NCA)","start":{"date-parts":[[2016,10,31]]},"location":"Cambridge, Boston, MA, USA","end":{"date-parts":[[2016,11,2]]}},"container-title":["2016 IEEE 15th International Symposium on Network Computing and Applications (NCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7764659\/7778571\/07778593.pdf?arnumber=7778593","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,1,5]],"date-time":"2017-01-05T13:07:54Z","timestamp":1483621674000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7778593\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/nca.2016.7778593","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}