1. Al-Rousan, N.M., Trajković, L.: Machine learning models for classification of BGP anomalies. In: Proceedings of IEEE HPSR (2012)
2. Bahaa, A.M., Philip, B., Grenville, A.: BGP anomaly detection techniques: a survey. IEEE Commun. Surv. Tutor. 19, 377–396 (2016)
3. Bates, T., Smith, P., Huston, G.: CIDR Report. http://www.cidr-report.org/as2.0/ . Accessed 2018
4. BGPmon.net: Public event reporting. https://bgpstream.com . Accessed 2018
5. Butler, K., McDaniel, P., Aiello, W.: Optimizing BGP security by exploiting path stability. In: Proceedings of ACM CCS (2006)