<--- Back to Details
First PageDocument Content
Internet / Computing / Network architecture / Routing / Internet Standards / IP addresses / IP hijacking / Internet security / Border Gateway Protocol / Autonomous system / Route Views / Router
Date: 2016-06-27 04:34:24
Internet
Computing
Network architecture
Routing
Internet Standards
IP addresses
IP hijacking
Internet security
Border Gateway Protocol
Autonomous system
Route Views
Router

ARTEMIS: Real-Time Detection and Automatic Mitigation for BGP Prefix Hijacking Gavriil Chaviaras, Petros Gigis, Pavlos Sermpezis, and Xenofontas Dimitropoulos FORTH / University of Crete, Greece {gchaviaras, gkigkis, se

Add to Reading List

Source URL: www.inspire.edu.gr

Download Document from Source Website

File Size: 127,50 KB

Share Document on Facebook

Similar Documents

Routing algorithms / Edsger W. Dijkstra / Mathematics / Game artificial intelligence / Combinatorial optimization / Search algorithms / Computing / Applied mathematics / Pathfinding / Shortest path problem / Deadlock / Routing

Efficient Traffic Routing with Progress Guarantees Stefan Blumer Manuel Eichelberger Roger Wattenhofer

DocID: 1xVZy - View Document

Internet architecture / Computing / Information and communications technology / Network architecture / OpenFlow / Networking hardware / Computer networking / Router / Routing

Sweet Little Lies: Fake Topologies for Flexible Routing Stefano Vissicchio University of Louvain

DocID: 1xVPP - View Document

Computing / Computer networking / Information and communications technology / Data transmission / Internet architecture / Internet protocols / Internet privacy / Network performance / Proxy server / Router / SOCKS / Internet protocol suite

Decoy Routing: Toward Unblockable Internet Communication Josh Karlin Daniel Ellard

DocID: 1xVLC - View Document

Cryptocurrencies / Computing / Bitcoin / Internet / Free software / Alternative currencies / Blockchains / Internet security / BGP hijacking / Mining pool / Ghash.io / Denial-of-service attack

Hijacking Bitcoin: Routing Attacks on Cryptocurrencies https://btc-hijack.ethz.ch Maria Apostolaki Aviv Zohar

DocID: 1xVI1 - View Document

Wheel + Ring = Reel: the Impact of Route Filtering on the Stability of Policy Routing Luca Cittadini Giuseppe Di Battista

DocID: 1xVsm - View Document