{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T06:04:36Z","timestamp":1743573876352},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,2]]},"DOI":"10.23919\/cnsm50824.2020.9269055","type":"proceedings-article","created":{"date-parts":[[2020,11,30]],"date-time":"2020-11-30T16:36:55Z","timestamp":1606754215000},"page":"1-7","source":"Crossref","is-referenced-by-count":4,"title":["Temporal Representations for Detecting BGP Blackjack Attacks"],"prefix":"10.23919","author":[{"given":"Rafael","family":"Copstein","sequence":"first","affiliation":[]},{"given":"Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3882"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3704"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7999"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131379"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3123878.3131992"},{"year":"0","key":"ref15","article-title":"Route views project"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2002.1007776"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4272"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278571"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398779"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/978-3-030-29959-0_6","article-title":"A taxonomy of attacks using bgp blackholing","author":"miller","year":"2019","journal-title":"Computer Security - ESORICS 2019"},{"year":"2005","key":"ref8","article-title":"Cisco. remotely triggered black hole filtering - destination based and source based"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2005.1541715"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278557"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4271"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1918"}],"event":{"name":"2020 16th International Conference on Network and Service Management (CNSM)","start":{"date-parts":[[2020,11,2]]},"location":"Izmir, Turkey","end":{"date-parts":[[2020,11,6]]}},"container-title":["2020 16th International Conference on Network and Service Management (CNSM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9269033\/9269034\/09269055.pdf?arnumber=9269055","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T16:47:31Z","timestamp":1643129251000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9269055\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,2]]},"references-count":16,"URL":"https:\/\/doi.org\/10.23919\/cnsm50824.2020.9269055","relation":{},"subject":[],"published":{"date-parts":[[2020,11,2]]}}}