http://www.bgpmon.net/turkey-hijacking-ip-
addresses-for-popular-global-dns-providers/.
CAIDA (2016). Center for applied internet data analysis.
http://www.caida.org/data.
Ceneda, D., Di Bartolomeo, M., Di Donato, V., Patrignani,
M., Pizzonia, M., and Rimondini, M. (2016). Rout-
ingwatch: Visual exploration and analysis of routing
events. In NOMS. IEEE.
Chi, Y.-J., Oliveira, R., and Zhang, L. (2008). Cyclops: the
as-level connectivity observatory. ACM SIGCOMM
Computer Communication Review, 38(5):5–16.
Di Battista, L. C. G., Mariani, F., and Pizzonia, M. P. M.
(2005). Visualizing interdomain routing with bgplay.
Di Donato, V., Patrignani, M., and Squarcella, C. (2016).
Netfork: Mapping time to space in network visual-
ization. In Proceedings of the International Working
Conference on Advanced Visual Interfaces, pages 92–
99. ACM.
Endsley, M. R. (2016). Designing for situation awareness:
An approach to user-centered design. CRC press.
Fink, G. A., North, C. L., Endert, A., and Rose, S. (2009).
Visualizing cyber security: Usable workspaces. In Vi-
sualization for Cyber Security, 2009. VizSec 2009. 6th
International Workshop on, pages 45–56. IEEE.
Fischer, F., Fuchs, J., Vervier, P.-A., Mansmann, F., and
Thonnard, O. (2012). Vistracer: a visual analytics
tool to investigate routing anomalies in traceroutes. In
Proceedings of the ninth international symposium on
visualization for cyber security, pages 80–87. ACM.
Fisher, D. (2010). Animation for visualization: opportuni-
ties and drawbacks. Ch, 19:329–352.
Ganichev, I., Dai, B., Godfrey, P., and Shenker, S.
(2010). Yamr: Yet another multipath routing protocol.
ACM SIGCOMM Computer Communication Review,
40(5):13–19.
Goldberg, S. (2014). Why is it taking so long to secure inter-
net routing? Communications of the ACM, 57(10):56–
63.
Golledge, R. G. (1999). Wayfinding behavior: Cognitive
mapping and other spatial processes. JHU press.
Hartson, R. and Pyla, P. S. (2012). The UX Book: Process
and guidelines for ensuring a quality user experience.
Elsevier.
Iamartino, D. (2015). Study and Measurements of the RPKI
Deployment.
Iamartino, D., Pelsser, C., and Bush, R. (2015). Measuring
bgp route origin registration and validation. In Inter-
national Conference on Passive and Active Network
Measurement, pages 28–40. Springer.
Keim, D. A., Kohlhammer, J., Ellis, G., and Mansmann, F.
(2010). Mastering the information age-solving prob-
lems with visual analytics. Florian Mansmann.
Kent, S., Lynn, C., and Seo, K. (2000). Secure border gate-
way protocol (s-bgp). IEEE Journal on Selected areas
in Communications, 18(4):582–592.
Lad, M., Zhang, L., and Massey, D. (2004). Link-rank: A
graphical tool for capturing bgp routing dynamics. In
NOMS, volume 1, pages 627–640. IEEE.
Lepinski, M. and Kent, S. (2012). An infrastructure to
support secure internet routing. RFC 6480 (Informa-
tional).
Lutu, A., Bagnulo, M., and Maennel, O. (2013). The
bgp visibility scanner. In Computer Communications
Workshops (INFOCOM WKSHPS), 2013 IEEE Con-
ference on, pages 115–120. IEEE.
Lychev, R., Goldberg, S., and Schapira, M. (2013). BGP
Security in Partial Deployment: Is the Juice worth the
Squeeze? In SIGCOMM, pages 171–182. ACM.
Mohapatra, P., Scudder, J., Ward, D., Bush, R., and Austein,
R. (2013). BGP Prefix Origin Validation. RFC 6811
(Proposed Standard).
NIST (2015). NIST RPKI Monitor. https://rpki-
monitor.antd.nist.gov/.
Papadopoulos, S., Moustakas, K., and Tzovaras, D.
(2013a). Bgpviewer: Using graph representations to
explore bgp routing changes. In Digital Signal Pro-
cessing (DSP), 2013 18th International Conference
on, pages 1–6. IEEE.
Papadopoulos, S., Theodoridis, G., and Tzovaras, D.
(2013b). Bgpfuse: using visual feature fusion for the
detection and attribution of bgp anomalies. In Pro-
ceedings of the Tenth Workshop on Visualization for
Cyber Security, pages 57–64. ACM.
RIPE-NCC (2016). Rseaux ip europens network coordi-
nation centre. https://www.ripe.net/analyse/internet-
measurements/routing-information-service-ris/ris-
raw-data.
RouteViews (2016). Bgp routing database.
http://www.routeviews.org/.
Shearer, J., Ma, K.-L., and Kohlenberg, T. (2008). Bgpeep:
An ip-space centered view for internet routing data.
In Visualization for Computer Security, pages 95–110.
Springer.
ThousandEyes (2016). Bgp route monitoring.
https://www.thousandeyes.com/.
Yan, H., Oliveira, R., Burnett, K., Matthews, D., Zhang, L.,
and Massey, D. (2009). Bgpmon: A real-time, scal-
able, extensible monitoring system. In CATCH’09.
Cybersecurity Applications & Technology.
IVAPP 2017 - International Conference on Information Visualization Theory and Applications
216