{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T23:21:58Z","timestamp":1777591318971,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":84,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T00:00:00Z","timestamp":1698105600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"NSF","award":["CNS-2247306"],"award-info":[{"award-number":["CNS-2247306"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,24]]},"DOI":"10.1145\/3618257.3624806","type":"proceedings-article","created":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T00:19:52Z","timestamp":1698020392000},"page":"73-88","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["RoVista: Measuring and Analyzing the Route Origin Validation (ROV) in RPKI"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9095-3929","authenticated-orcid":false,"given":"Weitong","family":"Li","sequence":"first","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1552-198X","authenticated-orcid":false,"given":"Zhexiao","family":"Lin","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8282-6225","authenticated-orcid":false,"given":"Md. Ishtiaq","family":"Ashiq","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8275-5460","authenticated-orcid":false,"given":"Emile","family":"Aben","sequence":"additional","affiliation":[{"name":"RIPE NCC, Amsterdam, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9816-5625","authenticated-orcid":false,"given":"Romain","family":"Fontugne","sequence":"additional","affiliation":[{"name":"IIJ Research Lab, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3154-9536","authenticated-orcid":false,"given":"Amreesh","family":"Phokeer","sequence":"additional","affiliation":[{"name":"Internet Society, Reston, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4323-4080","authenticated-orcid":false,"given":"Taejoong","family":"Chung","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Abuse.ch Feodo Tracker. https:\/\/feodotracker.abuse.ch\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Registratie van RPKI-informatie voor een veilige routering. https:\/\/www.bit.nl\/news\/2081\/88\/Registratie-van-RPKI-informatie-voor-een-veilige-routering."},{"key":"e_1_3_2_1_3_1","unstructured":"16.2R2-S9: Software Release Notification for Junos Software Service Release version 16.2R2-S9. https: \/\/supportportal.juniper.net\/s\/article\/16--2R2-S9-Software-Release-Notification-for-Junos-Software-Service-Release-version-16--2R2-S9?language=en US."},{"key":"e_1_3_2_1_4_1","unstructured":"AT&T (AS 7018). Personal Communication."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282411"},{"key":"e_1_3_2_1_6_1","volume-title":"https:\/\/mailman.nanog.org\/pipermail\/nanog\/ 2019-February\/099501.html","author":"Borkenhagen J.","year":"2019","unstructured":"J. Borkenhagen. AT&T\/AS 7018 Now Drops Invalid Prefixes from Peers. https:\/\/mailman.nanog.org\/pipermail\/nanog\/ 2019-February\/099501.html, 2019."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2009.2034031"},{"key":"e_1_3_2_1_8_1","volume-title":"IETF","author":"Bush R.","year":"2013","unstructured":"R. Bush and R. Austein. The Resource Public Key Infrastructure (RPKI) to Router Protocol. RFC 6810, IETF, 2013."},{"key":"e_1_3_2_1_9_1","volume-title":"IETF","author":"Bush R.","year":"2017","unstructured":"R. Bush and R. Austein. https:\/\/tools.ietf.org\/html\/rfc8210. RFC 8210, IETF, 2017."},{"key":"e_1_3_2_1_10_1","volume-title":"Hackers emptied Ethereum wallets by breaking the basic infrastructure of the internet","author":"Brandom R.","year":"2018","unstructured":"R. Brandom. Hackers emptied Ethereum wallets by breaking the basic infrastructure of the internet. 2018. https: \/\/www.theverge.com\/2018\/4\/24\/17275982\/myetherwallet-hack-bgp-dns-hijacking-stolen-ethereum."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"S. Bisgaard and M. Kulahci. Time Series Analysis and Forecasting by Example. Wiley 2011.","DOI":"10.1002\/9781118056943"},{"key":"e_1_3_2_1_12_1","unstructured":"BGP Announcement Filtering - Extract from the route server guides. https:\/\/www.de-cix.net\/en\/about-de-cix\/news\/ insights-how-and-what-the-de-cix-route-servers-filter."},{"key":"e_1_3_2_1_13_1","unstructured":"BGPStream. https:\/\/bgpstream.com\/."},{"key":"e_1_3_2_1_14_1","unstructured":"BIT (AS12859). Personal Communication."},{"key":"e_1_3_2_1_15_1","unstructured":"J. Cowie. China's 18-Minute Mystery. 2010. https:\/\/dyn.com\/ blog\/chinas-18-minute-mystery\/."},{"key":"e_1_3_2_1_16_1","unstructured":"M. Candela. A One-Year Review of RPKI Operations. https: \/\/ripe84.ripe.net\/archives\/video\/741\/."},{"key":"e_1_3_2_1_17_1","volume-title":"IMC","author":"Chung T.","year":"2019","unstructured":"T. Chung, E. Aben, T. Bruijnzeels, B. Chandrasekaran, D. Choffnes, D. Levin, B. M. Maggs, A. Mislove, R. van Rijswijk-Deij, J. P. Rula, and N. Sullivan. RPKI is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins. IMC, 2019."},{"key":"e_1_3_2_1_18_1","volume-title":"Accurate and Efficient Measurement of ROV Deployment. NDSS","author":"Chen W.","year":"2022","unstructured":"W. Chen, Z. Wang, D. Han, C. Duan, X. Yin, J. Yang, and X. Shi. ROV-MI: Large-Scale, Accurate and Efficient Measurement of ROV Deployment. NDSS, 2022."},{"key":"e_1_3_2_1_19_1","volume-title":"Measuring RPKI Adoption via the data-plane. NLNOG Day","author":"Cartwright-Cox B.","year":"2018","unstructured":"B. Cartwright-Cox. Measuring RPKI Adoption via the data-plane. NLNOG Day 2018. https:\/\/nlnog.net\/static\/ nlnogday2018\/8 Measuring RPKI ben NLNOG 2018.pdf."},{"key":"e_1_3_2_1_20_1","unstructured":"Chapter: Implementing Cisco ASR 9000 vDDoS Mitigation. https:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/routers\/asr9000\/ software\/asr9k-r6-5\/system-security\/configuration\/guide\/b-system-security-cg-asr9000--65x\/b-system-security-cg-asr9000--65x chapter 01110.html."},{"key":"e_1_3_2_1_21_1","unstructured":"Cogent RPKI invalid filtering. https:\/\/ lists.archive.carbon60.com\/nanog\/users\/216856."},{"key":"e_1_3_2_1_22_1","unstructured":"Comcast (AS 7922). Personal Communication."},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the 22nd ACM Internet Measurement Conference","author":"Testart B. DU, C.","year":"2022","unstructured":"B. DU, C. Testart, R. Fontugne, G. Akiwate, A. C. Snoeren, and K. Claffy. Mind your MANRS: measuring the MANRS ecosystem. Proceedings of the 22nd ACM Internet Measurement Conference, 2022."},{"key":"e_1_3_2_1_24_1","volume-title":"The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research","author":"Dittrich D.","year":"2012","unstructured":"D. Dittrich and E. Kenneally. The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. 2012. https:\/\/www.dhs.gov\/sites\/default\/files\/ publications\/CSD-MenloPrinciplesCORE-20120803 1.pdf."},{"key":"e_1_3_2_1_25_1","volume-title":"SMap: Internet-wide Scanning for Spoofing. ACSAC","author":"Dai T.","year":"2021","unstructured":"T. Dai and H. Shulman. SMap: Internet-wide Scanning for Spoofing. ACSAC, IEEE Computer Society, 2021."},{"key":"e_1_3_2_1_26_1","volume-title":"USENIX Security","author":"Durumeric Z.","year":"2013","unstructured":"Z. Durumeric, E. Wustrow, and J. A. Halderman. ZMap: Fast Internet-Wide Scanning and its Security Applications. USENIX Security, 2013."},{"key":"e_1_3_2_1_27_1","unstructured":"Deutsche Telekom Non-ROV. https:\/\/twitter.com\/ deutschetelekom\/status\/1252177058555473920."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04918-2_11"},{"key":"e_1_3_2_1_29_1","volume-title":"Introduction to statistical time series","author":"Fuller W. A.","year":"2009","unstructured":"W. A. Fuller. Introduction to statistical time series. John Wiley & Sons, 2009."},{"key":"e_1_3_2_1_30_1","volume-title":"On inferring autonomous system relationships in the Internet","author":"Gao L.","year":"2001","unstructured":"L. Gao. On inferring autonomous system relationships in the Internet. IEEE\/ACM Transactions on networking, 9(6), IEEE, 2001."},{"key":"e_1_3_2_1_31_1","volume-title":"IETF","author":"George W.","year":"2017","unstructured":"W. George and S. Murphy. https:\/\/tools.ietf.org\/html\/rfc8206. RFC 8206, IETF, 2017."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23123"},{"key":"e_1_3_2_1_33_1","unstructured":"Github: Cloudflare repository. https:\/\/github.com\/cloudflare\/ isbgpsafeyet.com\/tree\/master\/data."},{"key":"e_1_3_2_1_34_1","volume":"202","author":"Huston G.","unstructured":"G. Huston and J. Damas. Measuring Route Origin Validation. 2020. https:\/\/www.potaroo.net\/ispcol\/2020-06\/rov.html.","journal-title":"J. Damas. Measuring Route Origin Validation."},{"key":"e_1_3_2_1_35_1","unstructured":"T. Hori. IIJ's Efforts with RPKI. https:\/\/www.iij.ad.jp\/en\/dev\/ iir\/pdf\/iir vol50 focus1 EN.pdf."},{"key":"e_1_3_2_1_36_1","unstructured":"Improved BGP Routing Security Adds Another Important Layer of Protection to Online Networks. https: \/\/corporate.comcast.com\/stories\/improved-bgp-routing-security-adds-another-layer-of-protection-to-network."},{"key":"e_1_3_2_1_37_1","unstructured":"Is BGP Safe Yet? https:\/\/isbgpsafeyet.com\/."},{"key":"e_1_3_2_1_38_1","volume-title":"IETF","author":"Lynn C.","year":"2003","unstructured":"C. Lynn, J. Mikkelson, and K. Seo. Secure BGP (S-BGP). IETF, 2003."},{"key":"e_1_3_2_1_39_1","volume-title":"IETF","author":"Lepinski M.","year":"2012","unstructured":"M. Lepinski and S. Kent. An Infrastructure to Support Secure Internet Routing. RFC 6480, IETF, 2012."},{"key":"e_1_3_2_1_40_1","volume-title":"IMC","author":"Luckie M.","year":"2013","unstructured":"M. Luckie, B. Huffaker, K. Claffy, A. Dhamdhere, and V. Giotsas. AS Relationships, Customer Cones, and Validation. IMC, 2013."},{"key":"e_1_3_2_1_41_1","volume-title":"https:\/\/twitter.com\/lumentechco\/status\/ 1374035675742412800","author":"Now Drops Invalid AS","year":"2021","unstructured":"Level3. Level3\/AS 7018 Now Drops Invalid Prefixes from Peers and Customers. https:\/\/twitter.com\/lumentechco\/status\/ 1374035675742412800, 2021."},{"key":"e_1_3_2_1_42_1","unstructured":"A. Medina. CenturyLink \/ Level 3 Outage Analysis. 2020. https:\/\/www.thousandeyes.com\/blog\/centurylink-level-3-outage-analysis."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8416"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29959-0_6"},{"key":"e_1_3_2_1_45_1","volume-title":"Border Gateway Protocol Hijacking - Examples and Solutions","author":"Moll O.","year":"2020","unstructured":"O. Moll. Border Gateway Protocol Hijacking - Examples and Solutions. 2020. https:\/\/www.anapaya.net\/blog\/border-gateway-protocol-hijacking-examples-and-solutions."},{"key":"e_1_3_2_1_46_1","volume-title":"IETF","author":"Mohapatra P.","year":"2013","unstructured":"P. Mohapatra, J. Scudder, D. Ward, R. Bush, and R. Austein. BGP Prefix Origin Validation. RFC 6811, IETF, 2013."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24438"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364596"},{"key":"e_1_3_2_1_49_1","unstructured":"MANRS for Network Operators. 2021. https:\/\/ www.manrs.org\/netops\/network-operator-actions\/."},{"key":"e_1_3_2_1_50_1","unstructured":"MANRS. MANRS Observatory. https:\/\/ observatory.manrs.org\/."},{"key":"e_1_3_2_1_51_1","unstructured":"Microsoft introduces steps to improve internet routing security. https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-introduces-steps-to-improve-internet-routing-security\/."},{"key":"e_1_3_2_1_52_1","unstructured":"Netflix (AS2906) Route Object Authorization. https:\/\/ bgp.he.net\/AS2906# prefixes."},{"key":"e_1_3_2_1_53_1","unstructured":"NTT. Routing Registry. https:\/\/www.gin.ntt.net\/support-center\/policies-procedures\/routing-registry\/#RPKI."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987482"},{"key":"e_1_3_2_1_55_1","unstructured":"Orange International Carriers - RPKI validation. https:\/\/ twitter.com\/OrangeIC\/status\/1541436188241891328."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"crossref","unstructured":"J. Postel. Internet Protocol. RFC 791 IETF 1981.","DOI":"10.17487\/rfc0791"},{"key":"e_1_3_2_1_57_1","volume-title":"Augur: Internet-Wide Detection of Connectivity Disruptions","author":"Pearce P.","year":"2017","unstructured":"P. Pearce, R. Ensafi, F. Li, N. Feamster, and V. Paxson. Augur: Internet-Wide Detection of Connectivity Disruptions. IEEE S&P, 2017."},{"key":"e_1_3_2_1_58_1","volume-title":"IETF","author":"Paxson V.","year":"2011","unstructured":"V. Paxson, M. Allman, J. Chu, and M. Sargent. Computing TCP's Retransmission Timer. RFC 6298, IETF, 2011. http: \/\/www.ietf.org\/rfc\/rfc6298.txt."},{"key":"e_1_3_2_1_59_1","volume-title":"Towards a Rigorous Methodology for Measuring Adoption of RPKI Route Validation and Filtering. CCR, 48(1)","author":"Reuter A.","year":"2018","unstructured":"A. Reuter, R. Bush, I. Cunha, E. Katz-Bassett, T. C. Schmidt, and M. Whlisch. Towards a Rigorous Methodology for Measuring Adoption of RPKI Route Validation and Filtering. CCR, 48(1), 2018."},{"key":"e_1_3_2_1_60_1","volume-title":"TMA","author":"Rodday N.","year":"2021","unstructured":"N. Rodday, I. Cunha, R. Bush, E. Katz-Bassett, G. D. Rodosek, T. C. Schmidt, and M. W \u00a8ahlisch. Revisiting RPKI Route Origin Validation on the Data Plane. TMA, 2021."},{"key":"e_1_3_2_1_61_1","unstructured":"RIPE Atlas. https:\/\/atlas.ripe.net\/."},{"key":"e_1_3_2_1_62_1","unstructured":"RIPE NCC Annual Report 2015. https:\/\/www.ripe.net\/ publications\/docs\/ripe-665."},{"key":"e_1_3_2_1_63_1","unstructured":"RIPE Routing Information Service (RIS). http:\/\/www.ripe.net\/ projects\/ris\/rawdata.html."},{"key":"e_1_3_2_1_64_1","unstructured":"RPKI Community Discord. https:\/\/discord.gg\/WaPgs8vEKy."},{"key":"e_1_3_2_1_65_1","unstructured":"RPKI Deployment Monitor. https:\/\/rpki-monitor.antd.nist.gov."},{"key":"e_1_3_2_1_66_1","unstructured":"RPKI I-ROV Per-Country filtering for AS7018: ATT-INTERNET4 United States of America (US). https:\/\/stats.labs.apnic.net\/rpki\/AS7018."},{"key":"e_1_3_2_1_67_1","unstructured":"RPKI deployment state: rpki.exposed. https: \/\/docs.google.com\/spreadsheets\/d\/1qduCCF p-czzFr9N-5STh3-NNAxyrYjECRwtgULR2c0."},{"key":"e_1_3_2_1_68_1","unstructured":"Rapid7 SSL Certificate Scans. https:\/\/scans.io\/study\/sonar.ssl."},{"key":"e_1_3_2_1_69_1","unstructured":"RIPE. RPKI Test. https:\/\/www.ripe.net\/s\/rpki-test\/."},{"key":"e_1_3_2_1_70_1","unstructured":"University of Oregon RouteViews project. http: \/\/www.routeviews.org\/."},{"key":"e_1_3_2_1_71_1","unstructured":"Routinator. https:\/\/nlnetlabs.nl\/projects\/rpki\/routinator\/."},{"key":"e_1_3_2_1_72_1","volume-title":"A Major BGP Hijack by AS55410-Vodafone Idea Ltd","author":"Siddiqui A.","year":"2020","unstructured":"A. Siddiqui. A Major BGP Hijack by AS55410-Vodafone Idea Ltd. 2020. https:\/\/www.manrs.org\/2021\/04\/a-major-bgp-hijack-by-as55410-vodafone-idea-ltd\/."},{"key":"e_1_3_2_1_73_1","volume-title":"Bit by Bit: Social Research for the Digital Age","author":"Salganik M.","year":"2016","unstructured":"M. Salganik. Bit by Bit: Social Research for the Digital Age. 2016."},{"key":"e_1_3_2_1_74_1","unstructured":"Swisscomm (AS3033). Personal Communication."},{"key":"e_1_3_2_1_75_1","volume-title":"PAM","author":"Testart C.","year":"2018","unstructured":"C. Testart, P. Richter, A. King, A. Dainotti, and D. Clark. To Filter or not to Filter: Measuring the Benefits of Registering in the RPKI Today. PAM, 2018."},{"key":"e_1_3_2_1_76_1","volume-title":"2018 48th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","author":"Tomas H.","year":"2018","unstructured":"H. Tomas, H. Amir, S. Haya, and W. Michael. Practical experience: Methodologies for measuring route origin validation. 2018 48th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), 2018."},{"key":"e_1_3_2_1_77_1","volume-title":"Facebook, Cloudflare cloud outage club.","author":"Tung L.","year":"2019","unstructured":"L. Tung. iCloud goes down: Apple joins the Google, Facebook, Cloudflare cloud outage club. 2019. https:\/\/www.zdnet.com\/article\/icloud-goes-down-apple-joins-the-google-facebook-cloudflare-cloud-outage-club\/."},{"key":"e_1_3_2_1_78_1","unstructured":"Telia (AS1299) announced ROV on June 10 2021. https:\/\/www.arelion.com\/our-network\/bgp-routing\/routing-security.html."},{"key":"e_1_3_2_1_79_1","unstructured":"The Spamhaus Project. https:\/\/www.spamhaus.org\/."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230576"},{"key":"e_1_3_2_1_81_1","volume-title":"IETF","author":"White R.","year":"2006","unstructured":"R. White. Architecture and Deployment Considerations for Secure Origin BGP (soBGP). IETF, 2006."},{"key":"e_1_3_2_1_82_1","volume-title":"A RIPE NCC RIS case study","author":"Hijacking YouTube","year":"2008","unstructured":"YouTube Hijacking: A RIPE NCC RIS case study. 2008. https:\/\/www.ripe.net\/publications\/news\/industry-developments\/youtube-hijacking-a-ripe-ncc-ris-case-study."},{"key":"e_1_3_2_1_83_1","unstructured":"\"Is BGP safe yet?\" test. https:\/\/seclists.org\/nanog\/2020\/Apr\/ 257."},{"key":"e_1_3_2_1_84_1","volume-title":"Rejecting invalids was fully implemented though-out the network February 24th","year":"2021","unstructured":"nielsfc: Rejecting invalids was fully implemented though-out the network February 24th 2021. https:\/\/github.com\/ cloudflare\/isbgpsafeyet.com\/pull\/523."}],"event":{"name":"IMC '23: ACM Internet Measurement Conference","location":"Montreal QC Canada","acronym":"IMC '23","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 2023 ACM on Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3618257.3624806","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3618257.3624806","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T13:16:03Z","timestamp":1755868563000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3618257.3624806"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,24]]},"references-count":84,"alternative-id":["10.1145\/3618257.3624806","10.1145\/3618257"],"URL":"https:\/\/doi.org\/10.1145\/3618257.3624806","relation":{},"subject":[],"published":{"date-parts":[[2023,10,24]]},"assertion":[{"value":"2023-10-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}