1. Biondi, P.: Scapy (2009), http://www.secdev.org/projects/scapy/
2. Bono, V.J.: 7007 Explanation and Apology (April 1997), http://www.merit.edu/mail.archives/nanog/1997-04/msg00444.html
3. Butler, K., Farley, T., McDaniel, P., Rexford, J.: A survey of BGP security issues and solutions. AT&T Labs Research (2008)
4. Chan, H., Dash, D., Perrig, A., Zhang, H.: Modeling adoptability of secure BGP protocol. ACM SIGCOMM Computer Communication Review 36(4), 290 (2006)
5. Colitti, L.: Active BGP Probing (2009), http://www.dia.uniroma3.it/~compunet/bgp-probing/