{"id":"https://openalex.org/W2209081732","doi":"https://doi.org/10.1109/pccc.2015.7410340","title":"Detecting BGP instability using Recurrence Quantification Analysis (RQA)","display_name":"Detecting BGP instability using Recurrence Quantification Analysis (RQA)","publication_year":2015,"publication_date":"2015-12-01","ids":{"openalex":"https://openalex.org/W2209081732","doi":"https://doi.org/10.1109/pccc.2015.7410340","mag":"2209081732"},"language":"en","primary_location":{"id":"doi:10.1109/pccc.2015.7410340","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pccc.2015.7410340","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046673696","display_name":"Bahaa Al-Musawi","orcid":"https://orcid.org/0000-0002-6738-4120"},"institutions":[{"id":"https://openalex.org/I47229656","display_name":"University of Kufa","ror":"https://ror.org/02dwrdh81","country_code":"IQ","type":"education","lineage":["https://openalex.org/I47229656"]},{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU","IQ"],"is_corresponding":true,"raw_author_name":"Bahaa Al-Musawi","raw_affiliation_strings":["CAIA, Swinburne University of Technology, Melbourne, Australia","University of Kufa, Al-Najaf, Iraq"],"affiliations":[{"raw_affiliation_string":"CAIA, Swinburne University of Technology, Melbourne, Australia","institution_ids":["https://openalex.org/I57093077"]},{"raw_affiliation_string":"University of Kufa, Al-Najaf, Iraq","institution_ids":["https://openalex.org/I47229656"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064991441","display_name":"Philip Branch","orcid":"https://orcid.org/0000-0003-2188-1452"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Philip Branch","raw_affiliation_strings":["CAIA, Swinburne University of Technology, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"CAIA, Swinburne University of Technology, Melbourne, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075839939","display_name":"Grenville Armitage","orcid":"https://orcid.org/0000-0002-2805-6511"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Grenville Armitage","raw_affiliation_strings":["CAIA, Swinburne University of Technology, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"CAIA, Swinburne University of Technology, Melbourne, Australia","institution_ids":["https://openalex.org/I57093077"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5046673696"],"corresponding_institution_ids":["https://openalex.org/I47229656","https://openalex.org/I57093077"],"apc_list":null,"apc_paid":null,"fwci":1.6641,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.86344272,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9672999978065491,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/recurrence-quantification-analysis","display_name":"Recurrence quantification analysis","score":0.9554983973503113},{"id":"https://openalex.org/keywords/border-gateway-protocol","display_name":"Border Gateway Protocol","score":0.9479097723960876},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6479076147079468},{"id":"https://openalex.org/keywords/autonomous-system","display_name":"Autonomous system (mathematics)","score":0.4744381010532379},{"id":"https://openalex.org/keywords/instability","display_name":"Instability","score":0.45286768674850464},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4431918263435364},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.41392892599105835},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4085843861103058},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.36521390080451965},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.27603673934936523},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.23398059606552124},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.14493289589881897},{"id":"https://openalex.org/keywords/nonlinear-system","display_name":"Nonlinear system","score":0.10334062576293945},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.08077868819236755},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.06291574239730835}],"concepts":[{"id":"https://openalex.org/C43456602","wikidata":"https://www.wikidata.org/wiki/Q7303254","display_name":"Recurrence quantification analysis","level":3,"score":0.9554983973503113},{"id":"https://openalex.org/C178086212","wikidata":"https://www.wikidata.org/wiki/Q11155","display_name":"Border Gateway Protocol","level":5,"score":0.9479097723960876},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6479076147079468},{"id":"https://openalex.org/C9628104","wikidata":"https://www.wikidata.org/wiki/Q788009","display_name":"Autonomous system (mathematics)","level":2,"score":0.4744381010532379},{"id":"https://openalex.org/C207821765","wikidata":"https://www.wikidata.org/wiki/Q405372","display_name":"Instability","level":2,"score":0.45286768674850464},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4431918263435364},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.41392892599105835},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4085843861103058},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.36521390080451965},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.27603673934936523},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.23398059606552124},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.14493289589881897},{"id":"https://openalex.org/C158622935","wikidata":"https://www.wikidata.org/wiki/Q660848","display_name":"Nonlinear system","level":2,"score":0.10334062576293945},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.08077868819236755},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.06291574239730835},{"id":"https://openalex.org/C57879066","wikidata":"https://www.wikidata.org/wiki/Q41217","display_name":"Mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C47318570","wikidata":"https://www.wikidata.org/wiki/Q8026863","display_name":"Wireless Routing Protocol","level":4,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/pccc.2015.7410340","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pccc.2015.7410340","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC)","raw_type":"proceedings-article"},{"id":"pmh:oai:researchbank.swinburne.edu.au:7fed3a96-3304-47a9-b046-012c215a99f5/1","is_oa":false,"landing_page_url":"http://hdl.handle.net/1959.3/409569","pdf_url":null,"source":{"id":"https://openalex.org/S4306401157","display_name":"Swinburne Research Bank (Swinburne University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I57093077","host_organization_name":"Swinburne University of Technology","host_organization_lineage":["https://openalex.org/I57093077"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"34th International Performance Computing and Communications Conference (IPCCC), Nanjing, China, 14-16 December 2015","raw_type":""}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W1555220698","https://openalex.org/W1648155216","https://openalex.org/W1973489837","https://openalex.org/W1979957032","https://openalex.org/W1989785271","https://openalex.org/W2047286795","https://openalex.org/W2061946625","https://openalex.org/W2069222612","https://openalex.org/W2081681829","https://openalex.org/W2083361829","https://openalex.org/W2083793737","https://openalex.org/W2099593264","https://openalex.org/W2104140995","https://openalex.org/W2108766572","https://openalex.org/W2111817166","https://openalex.org/W2113230746","https://openalex.org/W2118791829","https://openalex.org/W2122348941","https://openalex.org/W2124428761","https://openalex.org/W2141689873","https://openalex.org/W2158288704","https://openalex.org/W2158866936","https://openalex.org/W2159943424","https://openalex.org/W2170053756","https://openalex.org/W2216500185","https://openalex.org/W2269993545","https://openalex.org/W2999031389","https://openalex.org/W4229980359","https://openalex.org/W6633278866","https://openalex.org/W6688646296"],"related_works":["https://openalex.org/W2209081732","https://openalex.org/W2092976840","https://openalex.org/W2124224384","https://openalex.org/W2007000223","https://openalex.org/W2160565743","https://openalex.org/W2182380586","https://openalex.org/W2151972741","https://openalex.org/W649884950","https://openalex.org/W2535598766","https://openalex.org/W2066635411"],"abstract_inverted_index":{"The":[0],"Border":[1],"Gateway":[2],"Protocol":[3],"(BGP)":[4],"is":[5,42,122],"the":[6,26,91],"default":[7],"Internet":[8],"routing":[9],"protocol":[10],"that":[11,70,114,128],"manages":[12],"connectivity":[13],"among":[14],"Autonomous":[15],"Systems":[16],"(ASes).":[17],"Although":[18],"BGP":[19,46,73,76,101,118],"disruptions":[20],"are":[21],"rare,":[22],"when":[23],"they":[24],"occur":[25],"consequences":[27],"can":[28,104,115],"be":[29,58,105],"very":[30],"damaging.":[31],"Consequently":[32],"there":[33],"has":[34],"been":[35],"considerable":[36],"effort":[37],"aimed":[38],"at":[39],"understanding":[40],"what":[41],"normal":[43],"and":[44,81],"abnormal":[45,126],"traffic":[47,56,112],"and,":[48],"in":[49],"so":[50],"doing,":[51],"enable":[52],"potentially":[53],"disruptive":[54],"anomalous":[55],"to":[57,89,99,107,117,124],"identified":[59],"quickly.":[60],"In":[61],"this":[62,87],"paper,":[63],"we":[64],"make":[65],"two":[66],"contributions.":[67],"We":[68],"show":[69],"over":[71],"time":[72],"messages":[74],"from":[75],"speakers":[77],"have":[78],"deterministic,":[79],"recurrence":[80],"non-linear":[82],"properties,":[83],"then":[84],"build":[85],"on":[86],"insight":[88],"introduce":[90],"idea":[92],"of":[93,111],"using":[94],"Recurrence":[95],"Quantification":[96],"Analysis":[97],"(RQA)":[98],"detect":[100,125],"instability.":[102,119],"RQA":[103,121],"used":[106],"provide":[108],"rapid":[109],"identification":[110],"anomalies":[113],"lead":[116],"Furthermore,":[120],"able":[123],"behaviours":[127],"may":[129],"pass":[130],"without":[131],"observation.":[132]},"counts_by_year":[{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
