共 50 条
- [21] Detecting IP prefix Hijacking Using Data Reduction-Based and Binary Search Algorithm 2015 INTERNET TECHNOLOGIES AND APPLICATIONS (ITA) PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE (ITA 15), 2015, : 78 - 84
- [22] Cooperative Detection of Internet Prefix Hijacking JOURNAL OF INTERNET TECHNOLOGY, 2010, 11 (01): : 33 - 45
- [23] Model construction on prefix hijacking attack International Conference on Communication Technology Proceedings, ICCT, 2012, : 866 - 871
- [26] Estimating the Impact of BGP Prefix Hijacking 2021 IFIP NETWORKING CONFERENCE AND WORKSHOPS (IFIP NETWORKING), 2021,
- [27] Model Construction on Prefix Hijacking Attack PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 866 - 871
- [28] Stealthy IP Prefix Hijacking: Don't Bite Off More Than You Can Chew GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 2480 - 2485
- [29] Stealthy IP prefix hijacking: Don't bite off more than you can chew GLOBECOM IEEE Global Telecommun. Conf.,
- [30] Reclaim Your Prefix: Mitigation of Prefix Hijacking Using IPsec Tunnels 2017 IEEE 42ND CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2017, : 330 - 338