Author:
Khare Varun,Ju Qing,Zhang Beichuan
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Modeling the BGP Prefix Hijack via Pollution and Recovery Processes;Communications in Computer and Information Science;2024
2. Stop, DROP, and ROA;Proceedings of the 22nd ACM Internet Measurement Conference;2022-10-25
3. Let's Downgrade Let's Encrypt;Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security;2021-11-12
4. From IP to transport and beyond;Proceedings of the 2021 ACM SIGCOMM 2021 Conference;2021-08-09
5. Using bursty announcements for detecting BGP routing anomalies;Computer Networks;2021-04