{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,10]],"date-time":"2026-05-10T10:12:39Z","timestamp":1778407959617,"version":"3.51.4"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/netwks.2014.6958532","type":"proceedings-article","created":{"date-parts":[[2014,11,26]],"date-time":"2014-11-26T10:01:36Z","timestamp":1416996096000},"page":"1-5","source":"Crossref","is-referenced-by-count":6,"title":["Customer-side detection of Internet-scale traffic redirection"],"prefix":"10.1109","author":[{"given":"Paulo","family":"Salvador","sequence":"first","affiliation":[]},{"given":"Antonio","family":"Nogueira","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2221856"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2012.6375891"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.111006"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282411"},{"key":"2","article-title":"BGP Security Vulnerabilities Analysis, RFC 4272 (Informational)","author":"murphy","year":"2006","journal-title":"Internet Engineering Task Force"},{"key":"1","article-title":"A border gateway protocol 4 (bgp-4), rfc 4271 (draft standard)","author":"rekhter","year":"2006","journal-title":"Internet Engineering Task Force"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2168610"},{"key":"7","article-title":"The new threat: Targeted internet traffic misdirection","author":"cowie","year":"2013","journal-title":"Blog-Renesys-The Internet Intelligence Authority"},{"key":"6","article-title":"Stealing the internet-an internet-scale man in the middle attack","author":"pilosov","year":"2008","journal-title":"DEFCON16"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.041010.00041"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2009.2034031"},{"key":"9","doi-asserted-by":"crossref","first-page":"1147","DOI":"10.1109\/JSAC.2013.130616","article-title":"Characterizing Inter-Domain Rerouting by Betweenness Centrality after Disruptive Events","volume":"31","author":"liu","year":"2013","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2066284"}],"event":{"name":"2014 16th International Telecommunications Network Strategy and Planning Symposium (Networks)","location":"Funchal, Portugal","start":{"date-parts":[[2014,9,17]]},"end":{"date-parts":[[2014,9,19]]}},"container-title":["2014 16th International Telecommunications Network Strategy and Planning Symposium (Networks)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6936727\/6958520\/06958532.pdf?arnumber=6958532","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T20:59:08Z","timestamp":1498165148000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6958532\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/netwks.2014.6958532","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}