BGP hijacking
Results: 45
# | Item |
---|---|
41 | RPKI vs ROVER Comparing the Risks of BGP Security Solutions Aanchal Malhotra and Sharon Goldberg Boston University, [removed],[removed]Add to Reading ListSource URL: cryptome.orgLanguage: English - Date: 2014-06-13 10:37:29 |
42 | The End of Undetected BGP Route Hijacking (Detecting malicious behavior using global data analytics) 19 May 2014 Speaker LINX 85Add to Reading ListSource URL: www.renesys.comLanguage: English - Date: 2014-05-19 08:43:56 |
43 | Pretty Good BGP: Improving BGP by Cautiously Adopting Routes Josh KarlinAdd to Reading ListSource URL: crypto.stanford.eduLanguage: English - Date: 2008-05-05 10:08:47 |
44 | Analysis of BGP Prefix Origins During Google’s May 2005 Outage Tao WanAdd to Reading ListSource URL: www.ccsl.carleton.caLanguage: English - Date: 2011-09-09 13:57:17 |
45 | Interdomain traffic engineering with BGP B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure AbstractAdd to Reading ListSource URL: www.info.ucl.ac.beLanguage: English - Date: 2003-01-03 07:31:36 |