共 50 条
- [31] Visual Analytics for BGP Monitoring and Prefix Hijacking Identification IEEE NETWORK, 2012, 26 (06): : 33 - 39
- [32] Case Study Analysis on BGP: Prefix Hijacking and Transit AS 2016 10TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATION SYSTEMS SERVICES AND APPLICATIONS (TSSA), 2016,
- [34] Stealthy IP Prefix Hijacking: Don't Bite Off More Than You Can Chew GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 2480 - 2485
- [35] Stealthy IP prefix hijacking: Don't bite off more than you can chew GLOBECOM IEEE Global Telecommun. Conf.,
- [36] Improving IP Prefix Hijacking Detection by Tracing Hijack Fingerprints and Verifying Them through RIR Databases DCNET: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 1, 2016, : 57 - 63
- [37] A Prefix Hijacking Detection Model Based on the Immune Network Theory IEEE ACCESS, 2019, 7 : 132384 - 132394
- [39] How Can Multipath Dissemination Help to Detect Prefix Hijacking? 2011 20TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2011,
- [40] LDC: Detecting BGP Prefix Hijacking by Load Distribution Change 2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS & PHD FORUM (IPDPSW), 2012, : 1197 - 1203