{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:57:12Z","timestamp":1725494232088},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540758525"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-75853-2_4","type":"book-chapter","created":{"date-parts":[[2007,11,3]],"date-time":"2007-11-03T03:18:16Z","timestamp":1194059896000},"page":"37-48","source":"Crossref","is-referenced-by-count":3,"title":["Analysis of Diagnostic Capability for Hijacked Route Problem"],"prefix":"10.1007","author":[{"given":"Osamu","family":"Akashi","sequence":"first","affiliation":[]},{"given":"Kensuke","family":"Fukuda","sequence":"additional","affiliation":[]},{"given":"Toshio","family":"Hirotsu","sequence":"additional","affiliation":[]},{"given":"Toshiharu","family":"Sugawara","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Rekhter, Y., Li, T.: A Border Gateway Protocol 4 (BGP-4). RFC1771 (1995)","key":"4_CR1","DOI":"10.17487\/rfc1771"},{"unstructured":"Kern, E.: http:\/\/nitrous.digex.net","key":"4_CR2"},{"issue":"4","key":"4_CR3","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1145\/316194.316229","volume":"29","author":"M. Faloutsos","year":"1999","unstructured":"Faloutsos, M., Faloutsos, P., Faloutsos, C.: On Power-law Relationships of the Internet Topology. ACM SIGCOMM Computer Communication Review\u00a029(4), 251\u2013262 (1999)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"4_CR4","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"A.L. Barab\u00e1si","year":"1999","unstructured":"Barab\u00e1si, A.L., Albert, R.: Emergence of Scaling in Random Networks. Science\u00a0286, 509\u2013512 (1999)","journal-title":"Science"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/11568285_16","volume-title":"Ambient Networks","author":"O. Akashi","year":"2005","unstructured":"Akashi, O., Terauchi, A., Fukuda, K., Hirotsu, T., Maruyama, M., Sugawara, T.: Detection and Diagnosis of Inter-AS Routing Anomalies by Cooperative Intelligent Agents. In: Sch\u00f6nw\u00e4lder, J., Serrat, J. (eds.) DSOM 2005. LNCS, vol.\u00a03775, pp. 181\u2013192. Springer, Heidelberg (2005)"},{"key":"4_CR6","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/1162638.1162651","volume-title":"SIGCOMM workshops on Internet Netwrok Management","author":"O. Akashi","year":"2006","unstructured":"Akashi, O., Fukuda, K., Hirotsu, T., Sugawara, T.: Policy-based BGP Control Architecture for Autonomous Routing Management. In: SIGCOMM workshops on Internet Netwrok Management, pp. 77\u201382. ACM Press, New York (2006)"},{"unstructured":"RIPE, http:\/\/www.ripe.net\/","key":"4_CR7"},{"unstructured":"Lad, M., Massey, D., Pei, D., Wu, Y., Zhang, B., Zhang, L.: PHAS: Prefix Hijack Alert System. In: Proc. of 15th USENIX Security Symposium, pp. 153\u2013166 (2006)","key":"4_CR8"},{"key":"4_CR9","first-page":"290","volume-title":"Proc. of ICNP","author":"J. Karlin","year":"2006","unstructured":"Karlin, J., Forrest, S., Rexford, J.: Pretty Good BGP: Improving BGP by Cautiously Adopting Routes. In: Proc. of ICNP, pp. 290\u2013299. IEEE Computer Society Press, Los Alamitos (2006)"},{"issue":"3","key":"4_CR10","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MIC.2002.1003135","volume":"6","author":"O. Akashi","year":"2002","unstructured":"Akashi, O., Sugawara, T., Murakami, K., Maruyama, M., Koyanagi, K.: Agent System for Inter-AS Routing Error Diagnosis. IEEE Internet Computing\u00a06(3), 78\u201382 (2002)","journal-title":"IEEE Internet Computing"},{"key":"4_CR11","series-title":"LNCS(LNAI)","first-page":"245","volume-title":"8th Pacific Rim Int\u2019l Workshop on Multi-Agents (PRIMA), (IFMAS)","author":"A. Terauchi","year":"2005","unstructured":"Terauchi, A., Akashi, O., Maruyama, M., Fukuda, K., Sugawara, T., Hirotsu, T., Kurihara, S.: ARTISTE: An Agent Organization Management System for Multi-agent Systems. In: 8th Pacific Rim Int\u2019l Workshop on Multi-Agents (PRIMA) (IFMAS). LNCS(LNAI), vol.\u00a04078, pp. 245\u2013259. Springer, Heidelberg (2005)"},{"unstructured":"CAIDA: CAIDA\u2019s Macroscopic Topology AS Adjacencies, http:\/\/www.caida.org\/measurements\/skitter\/as_adjacencies.xml","key":"4_CR12"}],"container-title":["Lecture Notes in Computer Science","IP Operations and Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-75853-2_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:34:54Z","timestamp":1619505294000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-75853-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540758525"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-75853-2_4","relation":{},"subject":[]}}