1. Ballani, H., Francis, P., Zhang, X.: A study of prefix hijacking and interception in the internet. ACM SIGCOMM CCR 37(4), 265–276 (2007).
https://doi.org/10.1145/1282427.1282411
2. Butler, K., Farley, T., McDaniel, P., Rexford, J.: A survey of BGP security issues and solutions. Proc. IEEE 98(1), 100–122 (2010)
3. Cimpanu, C.: DNS Poisoning or BGP Hijacking Suspected Behind Trezor Wallet Phishing Incident. Bleeping Computer News (2018).
https://www.bleepingcomputer.com/news/security/dns-poisoning-or-bgp-hijacking-behind-trezor-wallet-phishing-incident/
4. Cowie, J.: The New Threat: Targeted Internet Traffic Misdirection. Blog - Renesys- The Internet Intelligence Authority (2013).
http://www.renesys.com/2013/11/mitm-internet-hijacking/
5. Goodman, L.A.: Analyzing Qualitative/Categorical Data: Log-linear Models and Latent Structure Analysis. Abt Books, Cambridge (1978)