Author:
Liu Yaping,Zhang Shuo,Zhu Haojin,Wan Peng-Jun,Gao Lixin,Zhang Yaoxue
Publisher
Springer International Publishing
Reference35 articles.
1. Qiu, S.Y., McDaniel, P.D., Monrose, F.: Toward valley-free inter-domain routing. In: IEEE ICC 2007, Glasgow, pp. 2009–2016. IEEE (2007)
2. Kalafut, A.J., Shue, C.A., Gupta, M.: Malicious hubs: detecting abnormally malicious autonomous systems. In: IEEE INFOCOM 2010, San Diego, pp. 1–5. IEEE (2010)
3. Mahajan, R., Wetherall, D., Anderson, T.: Understanding BGP misconfiguration. In: ACM SIGCOMM 2002, Pittsburgh, pp. 3–16. ACM (2002)
4. Nordström, O., Dovrolis, C.: Beware of BGP attacks. ACM SIGCOMM Comput. Commun. Rev. 34(2), 1–8 (2004)
5. Norton, W.B.: Study of 28 Peering Policies. Technical report. http://drpeering.net/whitepapers/Peering-Policies/A-Study-of-28-Peering-Policies.html