Author:
Zhu Peidong,Cao Huayang,Yang Laurence T.,Chen Kan
Funder
National Natural Science Foundation of China
Subject
Computer Science Applications,Modelling and Simulation
Reference29 articles.
1. Y. Rekhter, T. Li, S. Hares, A border gateway protocol 4 (BGP-4), in: RFC 4271, January 2006.
2. S. Murphy, BGP security vulnerabilities analysis, in: RFC 4272, January 2006.
3. S.A. Misel, Wow, AS7007!, NANOG mail archives, 1997. http://www.merit.edu/mail.archives/nanog/1997-04/msg00340.html.
4. T. Wan, P.C.V. Oorschot, Analysis of BGP prefix origins during google’s may 2005 outage, in: Proc. of Security in Systems and Networks, 2006.
5. Pakistan hijacks YouTube, 2008. http://www.renesys.com/blog/2008/02/pakistan_hijacks_youtube_1.shtml.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献