{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:49:35Z","timestamp":1740098975326,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":70,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,1]],"date-time":"2017-11-01T00:00:00Z","timestamp":1509494400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["679158"],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1145\/3131365.3131379","type":"proceedings-article","created":{"date-parts":[[2017,11,14]],"date-time":"2017-11-14T14:40:22Z","timestamp":1510670422000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":43,"title":["Inferring BGP blackholing activity in the internet"],"prefix":"10.1145","author":[{"given":"Vasileios","family":"Giotsas","sequence":"first","affiliation":[{"name":"CAIDA\/TU Berlin"}]},{"given":"Georgios","family":"Smaragdakis","sequence":"additional","affiliation":[{"name":"MIT\/TU Berlin"}]},{"given":"Christoph","family":"Dietzel","sequence":"additional","affiliation":[{"name":"TU Berlin\/DE-CIX"}]},{"given":"Philipp","family":"Richter","sequence":"additional","affiliation":[{"name":"TU Berlin"}]},{"given":"Anja","family":"Feldmann","sequence":"additional","affiliation":[{"name":"TU Berlin"}]},{"given":"Arthur","family":"Berger","sequence":"additional","affiliation":[{"name":"MIT\/Akamai"}]}],"member":"320","published-online":{"date-parts":[[2017,11]]},"reference":[{"volume-title":"State of the Internet","key":"e_1_3_2_1_1_1","unstructured":"Akamai. 2015--2017. State of the Internet ; Quarterly Security Reports . https:\/\/www.akamai.com\/us\/en\/our-thinking\/state-of-the-internet-report\/global-state-of-the-internet-security-ddos-attack-reports.jsp. (2015--2017). Akamai. 2015--2017. State of the Internet; Quarterly Security Reports. https:\/\/www.akamai.com\/us\/en\/our-thinking\/state-of-the-internet-report\/global-state-of-the-internet-security-ddos-attack-reports.jsp. (2015--2017)."},{"key":"e_1_3_2_1_2_1","unstructured":"Akamai. 2017. Kona Site Defender. https:\/\/www.akamai.com\/us\/en\/products\/cloud-security\/kona-site-defender.jsp. (2017). Akamai. 2017. Kona Site Defender. https:\/\/www.akamai.com\/us\/en\/products\/cloud-security\/kona-site-defender.jsp. (2017)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664285"},{"volume-title":"Understanding the Mirai Botnet. In USENIX Security Symposium.","author":"Antonakakis M.","key":"e_1_3_2_1_4_1","unstructured":"M. Antonakakis , T. April , M. Bailey , M. Bernhard , E. Bursztein , J. Cochran , Z. Durumeric , J. A. Halderman , L. Invernizzi , M. Kallitsis , D. Kumar , C. Lever , Z. Ma , J. Mason , D. Menscher , C. Seaman , N. Sullivan , K. Thomas , and Y. Zhou . 2017 . Understanding the Mirai Botnet. In USENIX Security Symposium. M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein, J. Cochran, Z. Durumeric, J. A. Halderman, L. Invernizzi, M. Kallitsis, D. Kumar, C. Lever, Z. Ma, J. Mason, D. Menscher, C. Seaman, N. Sullivan, K. Thomas, and Y. Zhou. 2017. Understanding the Mirai Botnet. In USENIX Security Symposium."},{"volume-title":"Major DNS provider hit by mysterious, focused DDoS attack. https:\/\/arstechnica.com\/information-technology\/2016\/05\/major-dns-provider-hit-by-mysterious-focused-ddos-attack. (May","year":"2016","key":"e_1_3_2_1_5_1","unstructured":"Ars Technica. 2016. Major DNS provider hit by mysterious, focused DDoS attack. https:\/\/arstechnica.com\/information-technology\/2016\/05\/major-dns-provider-hit-by-mysterious-focused-ddos-attack. (May 2016 ). Ars Technica. 2016. Major DNS provider hit by mysterious, focused DDoS attack. https:\/\/arstechnica.com\/information-technology\/2016\/05\/major-dns-provider-hit-by-mysterious-focused-ddos-attack. (May 2016)."},{"key":"e_1_3_2_1_6_1","unstructured":"BBC. 2012. 'Hacking attacks' hit Russian political sites. http:\/\/www.bbc.com\/news\/technology-16032402. (2012). BBC. 2012. 'Hacking attacks' hit Russian political sites. http:\/\/www.bbc.com\/news\/technology-16032402. (2012)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.3115\/1225403.1225421"},{"key":"e_1_3_2_1_8_1","unstructured":"C. Partridge P. Barford D. D. Clark S. Donelan V. Paxson J. Rexford and M. K. Vernon. 2003. The Internet Under Crisis Conditions: Learning from September 11. The National Academy Press. C. Partridge P. Barford D. D. Clark S. Donelan V. Paxson J. Rexford and M. K. Vernon. 2003. The Internet Under Crisis Conditions: Learning from September 11. The National Academy Press."},{"key":"e_1_3_2_1_9_1","unstructured":"CAIDA. 2014--2017. AS Classification. https:\/\/www.caida.org\/data\/as-classification\/. (2014--2017). CAIDA. 2014--2017. AS Classification. https:\/\/www.caida.org\/data\/as-classification\/. (2014--2017)."},{"key":"e_1_3_2_1_10_1","unstructured":"Censys Team at the University of Michigan. 2017. Internet-Wide Scan Data Repository. https:\/\/scans.io\/. (2017). Censys Team at the University of Michigan. 2017. Internet-Wide Scan Data Repository. https:\/\/scans.io\/. (2017)."},{"key":"e_1_3_2_1_11_1","volume-title":"BGP Communities Attribute. IETF RFC 1997","author":"Chandra R.","year":"1996","unstructured":"R. Chandra , P. Traina , and T. Li . 1996 . BGP Communities Attribute. IETF RFC 1997 . ( 1996 ). R. Chandra, P. Traina, and T. Li. 1996. BGP Communities Attribute. IETF RFC 1997. (1996)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541468.2541473"},{"key":"e_1_3_2_1_13_1","unstructured":"W. R. Cheswick S. M. Bellovin and A. D. Rubin. 2003. Firewalls and Internet Security: repelling the wily hacker. Addison-Wesley. W. R. Cheswick S. M. Bellovin and A. D. Rubin. 2003. Firewalls and Internet Security: repelling the wily hacker. Addison-Wesley."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7588277"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2079360.2079362"},{"key":"e_1_3_2_1_16_1","unstructured":"CISCO. 2005. Remotely Triggered Black Hole Filtering - Destination Based and Source Based. Cisco White Paper http:\/\/www.cisco.com\/c\/dam\/en_us\/about\/security\/intelligence\/blackhole.pdf. (2005). CISCO. 2005. Remotely Triggered Black Hole Filtering - Destination Based and Source Based. Cisco White Paper http:\/\/www.cisco.com\/c\/dam\/en_us\/about\/security\/intelligence\/blackhole.pdf. (2005)."},{"key":"e_1_3_2_1_17_1","unstructured":"B. Claise B. Trammell and P. Aitken. 2013. RFC 7011: Specification of the IPFIX Protocol for the Exchange of Flow Information. (2013). B. Claise B. Trammell and P. Aitken. 2013. RFC 7011: Specification of the IPFIX Protocol for the Exchange of Flow Information. (2013)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/52324.52336"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633059"},{"key":"e_1_3_2_1_20_1","unstructured":"Cogent. 2017. Customer User Guide. http:\/\/www.cogentco.com\/files\/docs\/customer_service\/guide\/global_cogent_customer_user_guide.pdf. (2017). Cogent. 2017. Customer User Guide. http:\/\/www.cogentco.com\/files\/docs\/customer_service\/guide\/global_cogent_customer_user_guide.pdf. (2017)."},{"key":"e_1_3_2_1_21_1","unstructured":"Cymru. 2017. BGP Bogon Refence. http:\/\/www.team-cymru.org\/bogon-reference-bgp.html. (2017). Cymru. 2017. BGP Bogon Refence. http:\/\/www.team-cymru.org\/bogon-reference-bgp.html. (2017)."},{"key":"e_1_3_2_1_22_1","unstructured":"Daily Mirror. 2016. Hackers attack the Stock Exchange: Cyber criminals take down website for more than two hours as part of protest against world's banks. (2016). Daily Mirror. 2016. Hackers attack the Stock Exchange: Cyber criminals take down website for more than two hours as part of protest against world's banks. (2016)."},{"key":"e_1_3_2_1_23_1","unstructured":"Deutsche Welle. 2015. Anonymous hacktivist explains why group is targeting Saudi Arabian government. (2015). Deutsche Welle. 2015. Anonymous hacktivist explains why group is targeting Saudi Arabian government. (2015)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3060601"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"C. Dietzel A. Feldmann and T. King. 2016. Blackholing at IXPs: On the Effectiveness of DDoS Mitigation in the Wild. In PAM. C. Dietzel A. Feldmann and T. King. 2016. Blackholing at IXPs: On the Effectiveness of DDoS Mitigation in the Wild. In PAM.","DOI":"10.1007\/978-3-319-30505-9_24"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355743"},{"volume-title":"USENIX Security Symposium.","author":"Durumeric Z.","key":"e_1_3_2_1_27_1","unstructured":"Z. Durumeric , E. Wustrow , and J. A. Halderman . 2013. ZMap: Fast Internet-Wide Scanning and its Security Applications . In USENIX Security Symposium. Z. Durumeric, E. Wustrow, and J. A. Halderman. 2013. ZMap: Fast Internet-Wide Scanning and its Security Applications. In USENIX Security Symposium."},{"key":"e_1_3_2_1_28_1","unstructured":"P. Faratin D. D. Clark S. Bauer W. Lehr P. Gilmore and A. Berger. 2008. The Growing Complexity of Internet Interconnection. Communications and Strategies 72 (2008). P. Faratin D. D. Clark S. Bauer W. Lehr P. Gilmore and A. Berger. 2008. The Growing Complexity of Internet Interconnection. Communications and Strategies 72 (2008)."},{"key":"e_1_3_2_1_29_1","unstructured":"Farsight Security. 2017. DNSDB. https:\/\/www.dnsdb.info\/. (2017). Farsight Security. 2017. DNSDB. https:\/\/www.dnsdb.info\/. (2017)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.974523"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.116"},{"key":"e_1_3_2_1_32_1","volume-title":"clafy","author":"Giotsas V.","year":"2016","unstructured":"V. Giotsas , A. Dhamdhere , and k. clafy . 2016 . Periscope : Unifying Looking Glass Querying. In PAM. V. Giotsas, A. Dhamdhere, and k. clafy. 2016. Periscope: Unifying Looking Glass Querying. In PAM."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098855"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663743"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2716281.2836122"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2659899"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626293"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"J. Heitz J. Snijders K. Patel I. Bagdonas and N. Hilliard. 2017. BGP Large Communities Attribute. IETF RFC 8092. (2017). J. Heitz J. Snijders K. Patel I. Bagdonas and N. Hilliard. 2017. BGP Large Communities Attribute. IETF RFC 8092. (2017).","DOI":"10.17487\/RFC8195"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987487"},{"key":"e_1_3_2_1_40_1","unstructured":"E. Katz-Bassett H. V. Madhyastha J. P. John A. Krishnamurthy D. Wetherall and T. Anderson. 2008. Studying Black Holes in the Internet with Hubble. In NSDI. E. Katz-Bassett H. V. Madhyastha J. P. John A. Krishnamurthy D. Wetherall and T. Anderson. 2008. Studying Black Holes in the Internet with Hubble. In NSDI."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"S. Khattak D. Fifield S. Afroz M. Javed S. Sundaresan V. Paxson S. J. Murdoch and D. McCoy. 2016. Do You See What I See? Differential Treatment of Anonymous Users. In NDSS. S. Khattak D. Fifield S. Afroz M. Javed S. Sundaresan V. Paxson S. J. Murdoch and D. McCoy. 2016. Do You See What I See? Differential Treatment of Anonymous Users. In NDSS.","DOI":"10.14722\/ndss.2016.23342"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"T. King C. Dietzel J. Snijders G. Doering and G. Hankins. 2016. BLACKHOLE Community. IETF RFC 7999. (2016). T. King C. Dietzel J. Snijders G. Doering and G. Hankins. 2016. BLACKHOLE Community. IETF RFC 7999. (2016).","DOI":"10.17487\/RFC7999"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2875951.2875955"},{"key":"e_1_3_2_1_44_1","unstructured":"KrebsOnSecurity. 2017. KrebsOnSecurity Hit With Record DDoS. https:\/\/krebsonsecurity.com\/2016\/09\/krebsonsecurity-hit-with-record-ddos. (2017). KrebsOnSecurity. 2017. KrebsOnSecurity Hit With Record DDoS. https:\/\/krebsonsecurity.com\/2016\/09\/krebsonsecurity-hit-with-record-ddos. (2017)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","unstructured":"W. Kumari and D. McPherson. 2009. Remote Triggered Black Hole Filtering with Unicast Reverse Path Forwarding (uRPF). IETF RFC 5635. (2009). W. Kumari and D. McPherson. 2009. Remote Triggered Black Hole Filtering with Unicast Reverse Path Forwarding (uRPF). IETF RFC 5635. (2009).","DOI":"10.17487\/rfc5635"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/347059.347428"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"C. Labovitz G. R. Malan and F. Jahanian. 1999. Origins of Internet routing instability. In IEEE INFOCOM. C. Labovitz G. R. Malan and F. Jahanian. 1999. Origins of Internet routing instability. In IEEE INFOCOM.","DOI":"10.1109\/INFCOM.1999.749286"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504735"},{"volume-title":"The BGP Visibility Scanner. In IEEE Infocom Workshops.","author":"Lutu A.","key":"e_1_3_2_1_49_1","unstructured":"A. Lutu , M. Bagnulo , and O. Maennel . 2013 . The BGP Visibility Scanner. In IEEE Infocom Workshops. A. Lutu, M. Bagnulo, and O. Maennel. 2013. The BGP Visibility Scanner. In IEEE Infocom Workshops."},{"key":"e_1_3_2_1_50_1","unstructured":"Merit Network. 2017. Merit RADb. http:\/\/radb.net\/. (2017). Merit Network. 2017. Merit RADb. http:\/\/radb.net\/. (2017)."},{"key":"e_1_3_2_1_51_1","unstructured":"New York Times. 2017. Hackers Hit Dozens of Countries Exploiting Stolen N.S.A. Tool. https:\/\/www.nytimes.com\/2017\/05\/12\/world\/europe\/uk-national-health-service-cyberattack.html. (2017). New York Times. 2017. Hackers Hit Dozens of Countries Exploiting Stolen N.S.A. Tool. https:\/\/www.nytimes.com\/2017\/05\/12\/world\/europe\/uk-national-health-service-cyberattack.html. (2017)."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997152"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1842733.1842736"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987482"},{"key":"e_1_3_2_1_55_1","unstructured":"Packet Clearing House. 2014--20017. Routing archive. https:\/\/www.pch.net\/resources\/data.php. (2014--20017). Packet Clearing House. 2014--20017. Routing archive. https:\/\/www.pch.net\/resources\/data.php. (2014--20017)."},{"key":"e_1_3_2_1_56_1","unstructured":"Packet Clearing House. 2017. PCH PoPs. https:\/\/www.pch.net\/about\/pops. (2017). Packet Clearing House. 2017. PCH PoPs. https:\/\/www.pch.net\/about\/pops. (2017)."},{"key":"e_1_3_2_1_57_1","unstructured":"PeeringDB. 2014--2017. PeeringDB website. https:\/\/www.peeringdb.com. (2014--2017). PeeringDB. 2014--2017. PeeringDB website. https:\/\/www.peeringdb.com. (2014--2017)."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663757"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987473"},{"key":"e_1_3_2_1_60_1","unstructured":"RIPE. 2014--2017. Routing Information Service. http:\/\/www.ripe.net\/ris\/. (2014--2017). RIPE. 2014--2017. Routing Information Service. http:\/\/www.ripe.net\/ris\/. (2014--2017)."},{"key":"e_1_3_2_1_61_1","unstructured":"RIPE. 2014--2017. RIPE Atlas. https:\/\/atlas.ripe.net\/. (2014--2017). RIPE. 2014--2017. RIPE Atlas. https:\/\/atlas.ripe.net\/. (2014--2017)."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.111006"},{"key":"e_1_3_2_1_63_1","unstructured":"Russia Today. 2016. RT targeted by massive DDoS attack during attempted Turkey coup. https:\/\/www.rt.com\/news\/351645-rt-massive-ddos-attack\/. (2016). Russia Today. 2016. RT targeted by massive DDoS attack during attempted Turkey coup. https:\/\/www.rt.com\/news\/351645-rt-massive-ddos-attack\/. (2016)."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"crossref","unstructured":"S. Sangli D. Tappan and Y. Rekhter. 2006. BGP Extended Communities Attribute. IETF RFC 4360. (2006). S. Sangli D. Tappan and Y. Rekhter. 2006. BGP Extended Communities Attribute. IETF RFC 4360. (2006).","DOI":"10.17487\/rfc4360"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/1897852.1897869"},{"key":"e_1_3_2_1_66_1","unstructured":"Telegraph. 2017. Unprecedented cyber attack takes Liberia's entire internet down. http:\/\/www.telegraph.co.uk\/technology\/2016\/11\/04\/unprecedented-cyber-attack-takes-liberias-entire-internet-down\/. (2017). Telegraph. 2017. Unprecedented cyber attack takes Liberia's entire internet down. http:\/\/www.telegraph.co.uk\/technology\/2016\/11\/04\/unprecedented-cyber-attack-takes-liberias-entire-internet-down\/. (2017)."},{"key":"e_1_3_2_1_67_1","unstructured":"TorrentFreak. 2017. Internet Backbone Provider Cogent Blocks Pirate Bay and other Pirate Sites. https:\/\/torrentfreak.com\/internet-backbone-provider-cogent-blocks-pirate-bay-and-other-pirate-sites-170209\/. (2017). TorrentFreak. 2017. Internet Backbone Provider Cogent Blocks Pirate Bay and other Pirate Sites. https:\/\/torrentfreak.com\/internet-backbone-provider-cogent-blocks-pirate-bay-and-other-pirate-sites-170209\/. (2017)."},{"key":"e_1_3_2_1_68_1","unstructured":"Tripwire. 2016. How a Massive 540 Gb\/sec DDoS Attack Failed to Spoil the Rio Olympics. https:\/\/www.tripwire.com\/state-of-security\/security-data-protection\/cyber-security\/how-a-massive-540-gbsec-ddos-attack-failed-to-spoil-the-rio-olympics\/. (2016). Tripwire. 2016. How a Massive 540 Gb\/sec DDoS Attack Failed to Spoil the Rio Olympics. https:\/\/www.tripwire.com\/state-of-security\/security-data-protection\/cyber-security\/how-a-massive-540-gbsec-ddos-attack-failed-to-spoil-the-rio-olympics\/. (2016)."},{"key":"e_1_3_2_1_69_1","unstructured":"University of Oregon. 2014--2017. Routeviews Project. http:\/\/www.routeviews.org\/. (2014--2017). University of Oregon. 2014--2017. Routeviews Project. http:\/\/www.routeviews.org\/. (2014--2017)."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637231"}],"event":{"name":"IMC '17: Internet Measurement Conference","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","USENIX Assoc USENIX Assoc"],"location":"London United Kingdom","acronym":"IMC '17"},"container-title":["Proceedings of the 2017 Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3131365.3131379","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T05:47:05Z","timestamp":1673329625000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3131365.3131379"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":70,"alternative-id":["10.1145\/3131365.3131379","10.1145\/3131365"],"URL":"https:\/\/doi.org\/10.1145\/3131365.3131379","relation":{},"subject":[],"published":{"date-parts":[[2017,11]]},"assertion":[{"value":"2017-11-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}