{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,11]],"date-time":"2024-06-11T12:33:46Z","timestamp":1718109226557},"reference-count":53,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2005,11,1]],"date-time":"2005-11-01T00:00:00Z","timestamp":1130803200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Network"],"published-print":{"date-parts":[[2005,11]]},"DOI":"10.1109\/mnet.2005.1541721","type":"journal-article","created":{"date-parts":[[2005,11,22]],"date-time":"2005-11-22T16:42:56Z","timestamp":1132677776000},"page":"49-56","source":"Crossref","is-referenced-by-count":59,"title":["Open issues in interdomain routing: a survey"],"prefix":"10.1109","volume":"19","author":[{"given":"M.","family":"Yannuzzi","sequence":"first","affiliation":[]},{"given":"X.","family":"Masip-Bruin","sequence":"additional","affiliation":[]},{"given":"O.","family":"Bonaventure","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1965"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2796"},{"key":"ref33","article-title":"Securing BGP through Secure Origin BGP","author":"white","year":"2003","journal-title":"IP J"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948133"},{"key":"ref31","article-title":"Working Around BGP: An Incremental Approach to Improving Security and Accuracy of Interdomain Routing","author":"goodell","year":"2003","journal-title":"NDSS"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/49.839934"},{"key":"ref37","author":"walton","year":"2005","journal-title":"Advertisement of Multiple Paths in BGP"},{"key":"ref36","article-title":"Distance Metrics in the Internet","author":"huffaker","year":"2002","journal-title":"Proc IEEE Int'l Telecomm Symp"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2005.1541720"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015488"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2385"},{"key":"ref27","author":"murphy","year":"2004","journal-title":"BGP Security Vulnerabilities Analysis"},{"key":"ref29","doi-asserted-by":"crossref","DOI":"10.1145\/964725.633027","article-title":"Understanding BGP Misconfigurations","author":"mahajan","year":"2002","journal-title":"ACM SIGCOMM 2002"},{"key":"ref2","article-title":"Analyzing the Internet's BGP Routing Table","volume":"4","author":"huston","year":"2001","journal-title":"IP J"},{"key":"ref1","year":"2004","journal-title":"IAB Concerns and Recommendations Regarding Internet Research and Evolution"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/316194.316231"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2005.1541719"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/90.993304"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.1145\/347057.347426","article-title":"Routing Stability in Congested Networks: Experimentation and Analysis","author":"shaikh","year":"2000","journal-title":"Proc ACM Sigcomm"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1999.781062"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997152"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354572"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637232"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2005.1452838"},{"key":"ref53","article-title":"QoS extensions to BGP","author":"xiao","year":"2002","journal-title":"ICNP2002"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2386"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2001.992760"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2439"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/116030.116034"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/633046.633047"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208930"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2004.09.008"},{"key":"ref15","article-title":"Limiting Path Exploration in BGP","author":"chandrashekar","year":"2005","journal-title":"Proc INFCOM"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015491"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/510726.510751"},{"key":"ref18","author":"bellovin","year":"2001","journal-title":"Slowing Routing Table Growth by Filtering Based on Address Allocation Policies"},{"key":"ref19","year":"0","journal-title":"IETF Site Multihoming in IPv6 Working Group"},{"key":"ref4","year":"0"},{"key":"ref3","year":"0"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1771"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2002.1019307"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/OPNARC.2003.1196373"},{"key":"ref7","author":"halabi","year":"2001","journal-title":"Internet Routing Architectures"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/967900.967974"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1145\/347057.347428","article-title":"Delayed Internet Routing Convergence","author":"labovitz","year":"2000","journal-title":"Proc ACM Sigcomm"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/NGI.2005.1431700"},{"key":"ref45","article-title":"Experiences in Building a Multihoming Load Balancing System","author":"guo","year":"2004","journal-title":"INFOCOM 2004"},{"key":"ref48","author":"agarwal","year":"2004","journal-title":"Controlling Hot Potatoes in Intradomain Traffic Engineering"},{"key":"ref47","article-title":"Multihoming Performance Benefits: An Experimental Evaluation of Practical Enterprise Strategies","author":"akella","year":"0","journal-title":"USENIX Annual Tech Conf 2004"},{"key":"ref42","doi-asserted-by":"crossref","DOI":"10.1145\/964725.633028","article-title":"On the Correctness of iBGP Configuration","author":"griffin","year":"2002","journal-title":"Proc ACM SIGCOMM 2002"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948243"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2003.08.008"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2005.1407694"}],"container-title":["IEEE Network"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/65\/32918\/01541721.pdf?arnumber=1541721","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:18:42Z","timestamp":1642004322000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1541721\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,11]]},"references-count":53,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2005,11]]}},"URL":"https:\/\/doi.org\/10.1109\/mnet.2005.1541721","relation":{},"ISSN":["0890-8044"],"issn-type":[{"value":"0890-8044","type":"print"}],"subject":[],"published":{"date-parts":[[2005,11]]}}}