{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:59:30Z","timestamp":1730267970825,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1109\/infcomw.2013.6562915","type":"proceedings-article","created":{"date-parts":[[2013,7,25]],"date-time":"2013-07-25T19:34:09Z","timestamp":1374780849000},"page":"447-452","source":"Crossref","is-referenced-by-count":8,"title":["Gaining insight into AS-level outages through analysis of Internet Background Radiation"],"prefix":"10.1109","author":[{"given":"Karyn","family":"Benson","sequence":"first","affiliation":[]},{"given":"Alberto","family":"Dainotti","sequence":"additional","affiliation":[]},{"given":"K. C.","family":"Claffy","sequence":"additional","affiliation":[]},{"given":"Emile","family":"Aben","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Computing TCP's Retransmission Timer","volume":"6298","author":"paxson","year":"2011","journal-title":"RFC"},{"journal-title":"Leaking Routes","year":"2012","author":"huston","key":"22"},{"year":"2012","author":"zalewski","key":"17"},{"key":"23","article-title":"Detecting Internet Outages with Precise Active Probing (extended)","author":"quan","year":"2012","journal-title":"USC\/Information Sciences Institute Technical Report"},{"year":"0","key":"18"},{"key":"24","article-title":"Studying black holes in the internet with hubble","author":"katz-bassett","year":"2008","journal-title":"USENIX Networked Systems Design & Implementation (NSDI 2008)"},{"journal-title":"TcpMaxConnectRetransmissions","year":"0","key":"15"},{"year":"2012","author":"king","key":"16"},{"journal-title":"UCSD Network Telescope Global Attack Traffic (Current)","year":"0","key":"13"},{"journal-title":"Conficker\/Conflicker\/Downadup as seen from the UCSD Network Telescope","year":"2008","author":"aben","key":"14"},{"key":"11","article-title":"M&M: A passive toolkit for measuring, correlating, and tracking path characteristics","author":"katti","year":"2004","journal-title":"MIT AI Lab Technical Report"},{"journal-title":"The UCSD Network Telescope","year":"2010","key":"12"},{"journal-title":"A BGP Leak Made in Canada","year":"2012","author":"toonk","key":"21"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879149"},{"key":"20","first-page":"554","article-title":"How the Internet in Australia went down under","year":"2012","journal-title":"Bgpmon Net\/blog\/?"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028794"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/2096149.2096154"},{"key":"10","article-title":"Bayesian packet loss detection for tcp","author":"fonseca","year":"2005","journal-title":"24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2005)"},{"key":"7","article-title":"Opportunistic measurement: Spurious network events as a light in the darkness","author":"casado","year":"2005","journal-title":"ACM Fourth Workshop on Hot Topics in Networks (HotNets-IV)"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1132026.1132027"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.59"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637244"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354571"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068818"}],"event":{"name":"2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","start":{"date-parts":[[2013,4,14]]},"location":"Turin","end":{"date-parts":[[2013,4,19]]}},"container-title":["2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6556114\/6562841\/06562915.pdf?arnumber=6562915","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T21:27:42Z","timestamp":1490218062000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6562915\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/infcomw.2013.6562915","relation":{},"subject":[],"published":{"date-parts":[[2013,4]]}}}