Funder
Major Science and Technology Project of Hainan Province
Subject
Modeling and Simulation,General Computer Science,Theoretical Computer Science
Reference31 articles.
1. S. Murphy, BGP Security Vulnerabilities Analysis, RFC Editor, 2006. https://doi.org/10.17487/rfc4272.
2. M. Schuchard, A. Mohaisen, D. Foo Kune, N. Hopper, Y. Kim, E.Y. Vasserman, Losing control of the internet: using the data plane to attack the control plane, in: Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010. https://doi.org/10.1145/1866307.1866411.
3. S. Sharwood, The register technical report: CenturyLink L3 outage knocks out web giants and 3.5% of all internet traffic (2020). 〈https://www.theregister.com/2020/08/31/centurylink_outage〉.
4. Major BGP leak disrupts thousands of networks globally (2021). 〈https://www.bleepingcomputer.com/news/security/major-bgp-leak-disrupts-thousands-of-networks-globally/〉.
5. Technique of evaluating AS importance based on preferred route;Liu;J. Softw.,2012
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献