共 50 条
- [1] Malicious BGP Hijacks: Appearances Can Be Deceiving 2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 884 - 889
- [3] Mind Your Blocks: On the Stealthiness of Malicious BGP Hijacks 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
- [4] Incremental Deployment Strategies for Effective Detection and Prevention of BGP Origin Hijacks 2014 IEEE 34TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2014), 2014, : 670 - 679
- [5] Protecting IoT Devices through Localized Detection of BGP Hijacks for Individual Things 2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2021), 2021, : 260 - 267
- [6] BGPy: The BGP Python']Python Security Simulator PROCEEDINGS OF 16TH CYBER SECURITY EXPERIMENTATION AND TEST WORKSHOP, CSET 2023, 2023, : 41 - 56
- [9] Inferring BGP Blackholing Activity in the Internet PROCEEDINGS OF THE 2017 INTERNET MEASUREMENT CONFERENCE (IMC'17), 2017, : 1 - 14
- [10] BGP-Multipath Routing in the Internet IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (03): : 2812 - 2826