Publisher
National Academy of Sciences of Ukraine (Co. LTD Ukrinformnauka)
Reference6 articles.
1. Sermpezis, P., Kotronis, V., Dainotti, A. and Dimitropoulos, X. (2018), "A survey among network operators on BGP prefx hijacking", ACM SIGCOMM Computer Communication Review, Vol. 48, no. 1, pp. 64-
2. Reuter, A., Bush, R. and Cunha, I. (2018), "Towards a rigorous methodology for measuring adoption of RPKI route validation and fltering", ACM SIGCOMM Computer Communication Review, Vol. 48, no. 1, pp. 19-
3. Zubok, (2018), "Determining the ways of counteraction to cyberattacks on the Internet global routing", Elektronne modelyuvannya, Vol. 40, no. 5, pp. 67-76.
4. (2018), ISO/IEC 27000:2018, Information technology. Security techniques. Information security management systems. Overview and vocabulary.
5. (2009), ISO Guide 73:2009. Risk management, ISO/TMBG.