{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T17:20:28Z","timestamp":1761326428573,"version":"build-2065373602"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T00:00:00Z","timestamp":1698624000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T00:00:00Z","timestamp":1698624000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,30]]},"DOI":"10.23919\/cnsm59352.2023.10327905","type":"proceedings-article","created":{"date-parts":[[2023,11,28]],"date-time":"2023-11-28T14:04:20Z","timestamp":1701180260000},"page":"1-5","source":"Crossref","is-referenced-by-count":4,"title":["BGPEval: Automating Large-Scale Testbed Creation"],"prefix":"10.23919","author":[{"given":"Nils","family":"Rodday","sequence":"first","affiliation":[{"name":"Research Institute CODE, Universit&#x00E4;t der Bundeswehr M&#x00FC;nchen"}]},{"given":"Gabi Dreo","family":"Rodosek","sequence":"additional","affiliation":[{"name":"Research Institute CODE, Universit&#x00E4;t der Bundeswehr M&#x00FC;nchen"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.23919\/TMA.2019.8784511"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/JPROC.2009.2034031"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.17487\/rfc6480","article-title":"An Infrastructure to Support Secure Internet Routing","volume-title":"RFC 6480","author":"Lepinski","year":"2012"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.17487\/RFC8205","article-title":"BGPsec Protocol Specification","volume-title":"RFC 8205","author":"Lepinski","year":"2017"},{"key":"ref5","article-title":"Architecture and deployment considerations for secure origin bgp (sobgp)","volume-title":"IETF Secretariat, Internet-Draft","author":"White","year":"2006"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/49.839934"},{"key":"ref7","article-title":"Pretty Secure BGP, psBGP","volume-title":"Network and Distributed System Security Symposium (NDSS)","author":"Wan","year":"2005"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/1266977.1266980"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/ICNP.2006.320179"},{"key":"ref10","article-title":"BGP AS_PATH Verification Based on Autonomous System Provider Authorization (ASPA) Objects","volume-title":"Internet Engineering Task Force, Internet-Draft draft-ietf-sidrops-aspa-verification-16","author":"Azimov","year":"2023"},{"key":"ref11","article-title":"RPKI Autonomous Systems Cones: A Profile To Define Sets of Autonomous Systems Numbers To Facilitate BGP Filtering","volume-title":"Internet Engineering Task Force, Internet-Draft draft-ietf-grow-rpki-as-cones-02","author":"Snijders","year":"2020"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/2934872.2934883"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.6028\/nist.tn.2060"},{"volume-title":"University of Oregon RouteViews Project","year":"2013","author":"Project","key":"ref14"},{"volume-title":"RIPE Routing Information Service (RIS)","year":"2020","key":"ref15"},{"volume-title":"The CAIDA AS Relationships Dataset, 20221001","year":"2022","key":"ref16"},{"volume-title":"Netdisco","key":"ref17"},{"volume-title":"Nessus","key":"ref18"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1007\/978-3-642-12331-3_2"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1007\/978-3-642-12331-3_3"},{"volume-title":"The Book of GNS3: Build Virtual Network Labs using Cisco, Juniper, and more","year":"2015","author":"Neumann","key":"ref21"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/1868447.1868466"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1145\/3386367.3431669"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/ICCSE.2015.7250212"},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.25080\/TCWV9851","volume-title":"Exploring Network Structure, Dynamics, and Function using NetworkX","author":"Hagberg","year":"2008"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1145\/3472951.3473505"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1145\/339331.339426"},{"volume-title":"Native Docker Clustering with Swarm","year":"2016","author":"Soppelsa","key":"ref28"},{"volume-title":"Gnu Zebra","year":"2002","author":"Ishiguro","key":"ref29"},{"volume-title":"Running 1,000 Containers in Docker Swarm","year":"2017","author":"Petric","key":"ref30"},{"key":"ref31","article-title":"Revisiting RPKI Route Origin Validation on the Data Plane","volume-title":"Proc. of Network Traffic Measurement and Analysis Conference (TMA)","author":"Rodday","year":"2021"},{"volume-title":"Internet Technologies Research Group","year":"2023","key":"ref32"}],"event":{"name":"2023 19th International Conference on Network and Service Management (CNSM)","start":{"date-parts":[[2023,10,30]]},"location":"Niagara Falls, ON, Canada","end":{"date-parts":[[2023,11,2]]}},"container-title":["2023 19th International Conference on Network and Service Management (CNSM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10327686\/10327788\/10327905.pdf?arnumber=10327905","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T17:14:32Z","timestamp":1761326072000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10327905\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,30]]},"references-count":32,"URL":"https:\/\/doi.org\/10.23919\/cnsm59352.2023.10327905","relation":{},"subject":[],"published":{"date-parts":[[2023,10,30]]}}}