Author:
Theodoridis Georgios,Tsigkas Orestis,Tzovaras Dimitrios
Reference12 articles.
1. Rekhter, Y., Li, T.: A border gateway protocol 4 (bgp-4). IETF RFC 1771.
http://www.ietf.org/rfc/rfc1771.txt
2. Sriram, K., Borchert, O., Kim, O., Gleichmann, P., Montgomery, D.: A comparative analysis of bgp anomaly detection and robustness algorithms. In: Proceedings of the CATCH ’09, (March 2009)
3. Ballani, H., Francis, P., Zhang, X.: A study of prefix hijacking and interception in the internet. In: Proceedings of the SIGCOMM ’07, Kyoto (2007)
4. Gao, L.: On inferring autonomous system relationships in the internet. IEEE/ACM Trans. Netw. 9(6), 733–745 (2001)
5. Deshpande, S., Thottan, M., Ho, T.K., Sikdar, B.: An online mechanism for bgp instability detection and analysis. IEEE Trans. Comput. 58(11), 3296–3304 (2009)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献