{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:11Z","timestamp":1750220051776,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"DOI":"10.1145\/3579856.3592822","type":"proceedings-article","created":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T14:52:13Z","timestamp":1688568733000},"page":"1016-1018","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["POSTER: A Cyberspace Study of the Russia-Ukraine War"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-8678-8056","authenticated-orcid":false,"given":"Gursimran","family":"Singh","sequence":"first","affiliation":[{"name":"Rochester Institute of Technology, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-2047-4292","authenticated-orcid":false,"given":"H. B.","family":"Acharya","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2006. The Selenium Web Driver. https:\/\/www.selenium.dev\/documentation\/  2006. The Selenium Web Driver. https:\/\/www.selenium.dev\/documentation\/"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2017.78"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2019.8845153"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068818"},{"key":"e_1_3_2_1_5_1","unstructured":"Young Hyun. 2009. CAIDA Archipelago Project. (2009).  Young Hyun. 2009. CAIDA Archipelago Project. (2009)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663722"},{"key":"e_1_3_2_1_7_1","volume-title":"Nation-state routing: Censorship, wiretapping, and BGP. arXiv preprint arXiv:0903.3218","author":"Karlin Josh","year":"2009","unstructured":"Josh Karlin , Stephanie Forrest , and Jennifer Rexford . 2009. Nation-state routing: Censorship, wiretapping, and BGP. arXiv preprint arXiv:0903.3218 ( 2009 ). Josh Karlin, Stephanie Forrest, and Jennifer Rexford. 2009. Nation-state routing: Censorship, wiretapping, and BGP. arXiv preprint arXiv:0903.3218 (2009)."},{"key":"e_1_3_2_1_8_1","volume-title":"Longitudinal Internet Censorship Measurement Platform. IEEE Symposium on Security and Privacy ([n. d.]). https:\/\/doi.org\/10","author":"Niaki Arian\u00a0Akhavan","year":"2020","unstructured":"Arian\u00a0Akhavan Niaki , Shinyoung Cho , Zachary Weinberg , Nguyen\u00a0Phong Hoang , Abbas Razaghpanah , Nicolas Christin , and Phillipa Gill . [n. d.]. ICLab : A Global , Longitudinal Internet Censorship Measurement Platform. IEEE Symposium on Security and Privacy ([n. d.]). https:\/\/doi.org\/10 .1109\/SP40000. 2020 .00014 10.1109\/SP40000.2020.00014 Arian\u00a0Akhavan Niaki, Shinyoung Cho, Zachary Weinberg, Nguyen\u00a0Phong Hoang, Abbas Razaghpanah, Nicolas Christin, and Phillipa Gill. [n. d.]. ICLab: A Global, Longitudinal Internet Censorship Measurement Platform. IEEE Symposium on Security and Privacy ([n. d.]). https:\/\/doi.org\/10.1109\/SP40000.2020.00014"},{"key":"e_1_3_2_1_9_1","volume-title":"Tranco: Research Oriented Top-Sites Ranking. https:\/\/tranco-list.eu","author":"Pochat Victor\u00a0Le","year":"2019","unstructured":"Victor\u00a0Le Pochat . 2019 . Tranco: Research Oriented Top-Sites Ranking. https:\/\/tranco-list.eu Victor\u00a0Le Pochat. 2019. Tranco: Research Oriented Top-Sites Ranking. https:\/\/tranco-list.eu"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19260-9_14"}],"event":{"name":"ASIA CCS '23: ACM ASIA Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Melbourne VIC Australia","acronym":"ASIA CCS '23"},"container-title":["Proceedings of the ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3592822","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:16Z","timestamp":1750183696000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3592822"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":10,"alternative-id":["10.1145\/3579856.3592822","10.1145\/3579856"],"URL":"https:\/\/doi.org\/10.1145\/3579856.3592822","relation":{},"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"2023-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}