Author:
Karlin Josh,Forrest Stephanie,Rexford Jennifer
Subject
Computer Networks and Communications
Reference47 articles.
1. S. Murphy, BGP Security Vulnerabilities Analysis, RFC 4272, January 2006.
2. R. Mahajan, D. Wetherall, T. Anderson, Understanding BGP misconfiguration, in: Proceedings of ACM SIGCOMM, 2002, pp. 3–16.
3. Renesys Blog, Pakistan Hijacks YouTube, .
4. J. Karlin, S. Forrest, J. Rexford, Pretty good BGP: Improving BGP by cautiously adopting routes, in: Proceedings of IEEE International Conference on Network Protocols, November 2006.
5. P. Boothe, J. Hiebert, R. Bush, How prevalent is prefix hijacking on the Internet? NANOG 36 , February 2006.
Cited by
25 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献