1. 1. Bates, T. and Gerich, E. (1994), "Representation of IP Routing Policies in a Routing Registry (ripe181)", available at: ftp://ftp.ripe.net/ripe/docs/ripe-181.txt (accessed Jun 20, 2019).
2. Determining the ways of counteraction To cyberattacks on the Internet global routing;Zubok;Elektron modelyuvannya,2018
3. 3. Levy, M.J. (2019), "The deep-dive into how Verizon and a BGP Optimizer Knocked Large Parts of the Internet Offline Monday", available at: https://blog.cloudflare.com/the-deep-diveinto-how-verizon-and-a-bgp-optimizer-knocked-large-parts-of-the-internet-offline-monday/(accessed Jul 27, 2019).
4. 4. Zubok, V. (2019), "Global Internet Routing Cyber attacks Risk Assessment", Elektronne modelyuvannya, Vol. 41, no. 2, pp. 97-110.
5. 5. Graivoronskyi, M. and Novikov, O. (2009), Bezpeka informatsiyno-kommunikaciynykh system [Security of Information Communication Systems], Vyd. hrupa BHV, Kiev, Ukraine.