1. Ruwaifa Anwar , Haseeb Niaz , David Choffnes , Italo Cunha , Phillipa Gill , and Ethan Katz-Bassett . 2015 . Investigating Interdomain Routing Policies in the Wild . In Proc. of ACM IMC. Ruwaifa Anwar, Haseeb Niaz, David Choffnes, Italo Cunha, Phillipa Gill, and Ethan Katz-Bassett. 2015. Investigating Interdomain Routing Policies in the Wild. In Proc. of ACM IMC.
2. The NetworkX Developers Aric Hagberg. 2022. Graphviz. https://graphviz.org/ The NetworkX Developers Aric Hagberg. 2022. Graphviz. https://graphviz.org/
3. Alexander Azimov Eugene Bogomazov Randy Bush Keyur Patel and Job Snijders. 2022. BGP AS_PATH Verification Based on Resource Public Key Infrastructure (RPKI) Autonomous System Provider Authorization (ASPA) Objects. Internet-Draft draft-ietf-sidrops-aspa-verification-09. Internet Engineering Task Force. https://datatracker.ietf.org/doc/draft-ietf-sidrops-aspa-verification/09/ Work in Progress. Alexander Azimov Eugene Bogomazov Randy Bush Keyur Patel and Job Snijders. 2022. BGP AS_PATH Verification Based on Resource Public Key Infrastructure (RPKI) Autonomous System Provider Authorization (ASPA) Objects. Internet-Draft draft-ietf-sidrops-aspa-verification-09. Internet Engineering Task Force. https://datatracker.ietf.org/doc/draft-ietf-sidrops-aspa-verification/09/ Work in Progress.
4. Hitesh Ballani , Paul Francis , and Xinyang Zhang . 2007 . A Study of Prefix Hijacking and Interception in the Internet . In Proc. of ACM SIGCOMM. 265–276 . https://doi.org/10.1145/1282380.1282411 10.1145/1282380.1282411 Hitesh Ballani, Paul Francis, and Xinyang Zhang. 2007. A Study of Prefix Hijacking and Interception in the Internet. In Proc. of ACM SIGCOMM. 265–276. https://doi.org/10.1145/1282380.1282411
5. Tony Bates Geoff Huston and Philip Smith. [n. d.]. CIDR REPORT for 15 May 23. https://www.cidr-report.org/as2.0/ Tony Bates Geoff Huston and Philip Smith. [n. d.]. CIDR REPORT for 15 May 23. https://www.cidr-report.org/as2.0/