{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T05:45:10Z","timestamp":1751521510549,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,15]],"date-time":"2012-10-15T00:00:00Z","timestamp":1350259200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004963","name":"Seventh Framework Programme","doi-asserted-by":"publisher","award":["257495"],"award-info":[{"award-number":["257495"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,15]]},"DOI":"10.1145\/2379690.2379701","type":"proceedings-article","created":{"date-parts":[[2012,10,4]],"date-time":"2012-10-04T20:18:52Z","timestamp":1349381932000},"page":"80-87","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["VisTracer"],"prefix":"10.1145","author":[{"given":"Fabian","family":"Fischer","sequence":"first","affiliation":[{"name":"University of Konstanz"}]},{"given":"Johannes","family":"Fuchs","sequence":"additional","affiliation":[{"name":"University of Konstanz"}]},{"given":"Pierre-Antoine","family":"Vervier","sequence":"additional","affiliation":[{"name":"Institut Eurecom"}]},{"given":"Florian","family":"Mansmann","sequence":"additional","affiliation":[{"name":"University of Konstanz"}]},{"given":"Olivier","family":"Thonnard","sequence":"additional","affiliation":[{"name":"Symantec Research Labs"}]}],"member":"320","published-online":{"date-parts":[[2012,10,15]]},"reference":[{"volume-title":"August","year":"2011","key":"e_1_3_2_1_1_1","unstructured":"Prefix hijacking by michael lindsay via internap. http:\/\/mailman.nanog.org\/pipermail\/nanog\/2011-August\/039381.html , August 2011 . Prefix hijacking by michael lindsay via internap. http:\/\/mailman.nanog.org\/pipermail\/nanog\/2011-August\/039381.html, August 2011."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282411"},{"key":"e_1_3_2_1_3_1","volume-title":"June","author":"Bush R.","year":"2009","unstructured":"R. Bush and R. Austein . The RPKI and Origin Validation , June 2009 . R. Bush and R. Austein. The RPKI and Origin Validation, June 2009."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.7155\/jgaa.00102"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.7"},{"key":"e_1_3_2_1_6_1","first-page":"2","volume-title":"Seventh IFIP TC-6 TC-11 Conference on Communications and Multimedia Security","author":"Kent S.","year":"2003","unstructured":"S. Kent . Securing the Border Gateway Protocol: A Status Update . In In Seventh IFIP TC-6 TC-11 Conference on Communications and Multimedia Security , pages 2 -- 3 , 2003 . S. Kent. Securing the Border Gateway Protocol: A Status Update. In In Seventh IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, pages 2--3, 2003."},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. USENIX Security Symposium","author":"Lad M.","year":"2006","unstructured":"M. Lad , D. Massey , D. Pei , Y. Wu , B. Zhang , and L. Zhang . Phas: A prefix hijack alert system . In Proc. USENIX Security Symposium , 2006 . M. Lad, D. Massey, D. Pei, Y. Wu, B. Zhang, and L. Zhang. Phas: A prefix hijack alert system. In Proc. USENIX Security Symposium, 2006."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2006.108"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179576.1179592"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOM.2007.4550358"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159947"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85933-8_10"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/VL.1996.545307"},{"key":"e_1_3_2_1_14_1","unstructured":"Symantec Corporation. Symantec Internet Security Threat Report. http:\/\/www.symantec.com\/threatreport\/ April 2012.  Symantec Corporation. Symantec Internet Security Threat Report. http:\/\/www.symantec.com\/threatreport\/ April 2012."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88623-5_40"},{"key":"e_1_3_2_1_16_1","first-page":"505","volume-title":"Proceedings of the conference on Visualization '02, VIS '02","author":"Teoh S. T.","year":"2002","unstructured":"S. T. Teoh , K. L. Ma , S. F. Wu , and X. Zhao . Case study: interactive visualization for internet security . In Proceedings of the conference on Visualization '02, VIS '02 , pages 505 -- 508 , Washington, DC, USA , 2002 . IEEE Computer Society. S. T. Teoh, K. L. Ma, S. F. Wu, and X. Zhao. Case study: interactive visualization for internet security. In Proceedings of the conference on Visualization '02, VIS '02, pages 505--508, Washington, DC, USA, 2002. IEEE Computer Society."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179576.1179593"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029215"},{"key":"e_1_3_2_1_19_1","volume-title":"The 8th International Conference on emerging Networking EXperiments and Technologies, CoNEXT '12","author":"Vervier P.-A.","year":"2012","unstructured":"P.-A. Vervier and O. Thonnard . Spamtracer: Using Traceroute To Tracking Fly-By Spammers (under review) . In The 8th International Conference on emerging Networking EXperiments and Technologies, CoNEXT '12 , Nice, France , 2012 . ACM. P.-A. Vervier and O. Thonnard. Spamtracer: Using Traceroute To Tracking Fly-By Spammers (under review). In The 8th International Conference on emerging Networking EXperiments and Technologies, CoNEXT '12, Nice, France, 2012. ACM."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.57"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402996"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282412"}],"event":{"name":"VizSec '12: 2012 Symposium on Visualization for Cyber Security","acronym":"VizSec '12","location":"Seattle Washington USA"},"container-title":["Proceedings of the Ninth International Symposium on Visualization for Cyber Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2379690.2379701","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2379690.2379701","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:33:57Z","timestamp":1750239237000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2379690.2379701"}},"subtitle":["a visual analytics tool to investigate routing anomalies in traceroutes"],"short-title":[],"issued":{"date-parts":[[2012,10,15]]},"references-count":22,"alternative-id":["10.1145\/2379690.2379701","10.1145\/2379690"],"URL":"https:\/\/doi.org\/10.1145\/2379690.2379701","relation":{},"subject":[],"published":{"date-parts":[[2012,10,15]]},"assertion":[{"value":"2012-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}