{"id":"https://openalex.org/W2020230712","doi":"https://doi.org/10.1145/2557977.2558043","title":"The security appliance to BIRD software router","display_name":"The security appliance to BIRD software router","publication_year":2014,"publication_date":"2014-01-09","ids":{"openalex":"https://openalex.org/W2020230712","doi":"https://doi.org/10.1145/2557977.2558043","mag":"2020230712"},"language":"en","primary_location":{"id":"doi:10.1145/2557977.2558043","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2557977.2558043","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017825253","display_name":"Kyoungha Kim","orcid":null},"institutions":[{"id":"https://openalex.org/I4322298","display_name":"Towson University","ror":"https://ror.org/044w7a341","country_code":"US","type":"education","lineage":["https://openalex.org/I4322298"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Kyoungha Kim","raw_affiliation_strings":["Towson University, Towson, MD","TOWSON UNIVERSITY, Towson, MD"],"affiliations":[{"raw_affiliation_string":"Towson University, Towson, MD","institution_ids":["https://openalex.org/I4322298"]},{"raw_affiliation_string":"TOWSON UNIVERSITY, Towson, MD","institution_ids":["https://openalex.org/I4322298"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060556922","display_name":"Yanggon Kim","orcid":"https://orcid.org/0000-0003-1860-6601"},"institutions":[{"id":"https://openalex.org/I4322298","display_name":"Towson University","ror":"https://ror.org/044w7a341","country_code":"US","type":"education","lineage":["https://openalex.org/I4322298"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yanggon Kim","raw_affiliation_strings":["Towson University, Towson, MD","TOWSON UNIVERSITY, Towson, MD"],"affiliations":[{"raw_affiliation_string":"Towson University, Towson, MD","institution_ids":["https://openalex.org/I4322298"]},{"raw_affiliation_string":"TOWSON UNIVERSITY, Towson, MD","institution_ids":["https://openalex.org/I4322298"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5017825253"],"corresponding_institution_ids":["https://openalex.org/I4322298"],"apc_list":null,"apc_paid":null,"fwci":0.613,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.68103601,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.790222704410553},{"id":"https://openalex.org/keywords/router","display_name":"Router","score":0.6975821256637573},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.6447451114654541},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.545689582824707},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4721168279647827},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.43108826875686646},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3213818073272705},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.31464993953704834}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.790222704410553},{"id":"https://openalex.org/C2775896111","wikidata":"https://www.wikidata.org/wiki/Q642560","display_name":"Router","level":2,"score":0.6975821256637573},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.6447451114654541},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.545689582824707},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4721168279647827},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.43108826875686646},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3213818073272705},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.31464993953704834},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2557977.2558043","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2557977.2558043","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6299999952316284,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1535040167","https://openalex.org/W1877037860","https://openalex.org/W1940675549","https://openalex.org/W1967656199","https://openalex.org/W2003590000","https://openalex.org/W2006767904","https://openalex.org/W2026521549","https://openalex.org/W2065283652","https://openalex.org/W2071786013","https://openalex.org/W2081133008","https://openalex.org/W2123789985","https://openalex.org/W2128214410","https://openalex.org/W2135217862","https://openalex.org/W2141938573","https://openalex.org/W2142065670","https://openalex.org/W2143319827","https://openalex.org/W2159916242","https://openalex.org/W2159943424","https://openalex.org/W2162877415","https://openalex.org/W2169267327","https://openalex.org/W2183385101","https://openalex.org/W2302141481","https://openalex.org/W2308096330","https://openalex.org/W2506906025","https://openalex.org/W3158910085","https://openalex.org/W4210628913","https://openalex.org/W4300490703"],"related_works":["https://openalex.org/W2122026593","https://openalex.org/W2582203024","https://openalex.org/W1588358165","https://openalex.org/W4237683758","https://openalex.org/W2370711413","https://openalex.org/W2052038519","https://openalex.org/W2375932043","https://openalex.org/W2841075164","https://openalex.org/W1980506749","https://openalex.org/W2375594474"],"abstract_inverted_index":{"The":[0],"Internet":[1],"consists":[2],"of":[3,7,52,64,115,174,204,208,228,233],"a":[4,29,106,123,154,164,220],"large":[5],"number":[6],"interconnected":[8],"Autonomous":[9],"Systems":[10],"(ASes)":[11],"which":[12,48,60,109,150,234],"exchange":[13],"their":[14],"routes":[15],"using":[16,73],"Border":[17],"Gateway":[18],"Protocol":[19],"(BGP).":[20],"However,":[21],"it":[22,42],"was":[23],"originally":[24],"designed":[25],"to":[26,38,56,66,69,81,99,247],"operate":[27],"in":[28,122,133,196,219],"trusted":[30],"environment,":[31],"and":[32,117,120,201,206,223,230],"there":[33],"are":[34],"no":[35],"internal":[36],"mechanisms":[37],"protect":[39],"the":[40,85,148,175,178,194,199,216,239],"information":[41],"carries.":[43],"We":[44,182],"have":[45,146],"implemented":[46,111,236],"RTR-BIRD,":[47],"is":[49,61,84,110,143,187,235,245],"an":[50,101,212],"enhancement":[51],"BIRD":[53,205],"software":[54,89,155,180],"router":[55,90,156],"interact":[57,158],"with":[58,159,177],"RTRPKI":[59],"another":[62],"implementation":[63,91,96],"us":[65],"allow":[67],"RTR-BIRD":[68,126,186,229],"support":[70],"origin":[71,225],"validation":[72,226],"Resource":[74],"Public":[75],"Key":[76],"Infrastructure":[77],"(RPKI).":[78],"In":[79],"contrast":[80],"QuaggaSRx":[82,190],"that":[83,144,185,207],"only":[86,152],"one":[87],"RPKI-capable":[88],"at":[92],"this":[93],"time,":[94],"our":[95],"enables":[97],"users":[98],"access":[100],"empirical":[102],"cache":[103,108,166,176],"rather":[104],"than":[105,189],"virtual":[107],"by":[112,243],"National":[113],"Institute":[114],"Standards":[116],"Technology":[118],"(NIST)":[119],"resides":[121],"local.":[124],"Subsequently,":[125],"can":[127],"be":[128],"exploited":[129],"for":[130],"practical":[131],"testing":[132],"software-based":[134],"routing":[135],"environment":[136],"against":[137],"QuaggaSRx.":[138],"Our":[139],"main":[140],"contribution":[141],"here":[142],"we":[145],"developed":[147],"originator":[149],"not":[151],"makes":[153],"(BIRD)":[157],"RPKI":[160],"but":[161],"also":[162,183],"shares":[163],"validated":[165],"as":[167,169,191,193],"well":[168],"Route":[170],"Origin":[171],"Authorizations":[172],"(ROAs)":[173],"other":[179],"routers.":[181],"expect":[184],"faster":[188],"much":[192],"difference":[195],"performance":[197,218],"between":[198],"deployed":[200],"latest":[202],"version":[203],"Quagga.":[209],"It's":[210],"because":[211],"algorithm":[213],"theoretically":[214],"shows":[215],"same":[217,221,240],"situation,":[222],"each":[224,232,248],"scheme":[227],"QuaggaSRx,":[231],"based":[237],"on":[238],"standard":[241],"defined":[242],"IETF,":[244],"equivalent":[246],"other.":[249]},"counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
