BGP hijacking

Results: 45



#Item
41RPKI vs ROVER Comparing the Risks of BGP Security Solutions Aanchal Malhotra and Sharon Goldberg Boston University, [removed],[removed]

RPKI vs ROVER Comparing the Risks of BGP Security Solutions Aanchal Malhotra and Sharon Goldberg Boston University, [removed],[removed]

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2014-06-13 10:37:29
42The End of Undetected BGP Route Hijacking (Detecting malicious behavior using global data analytics) 19 May 2014 Speaker LINX 85

The End of Undetected BGP Route Hijacking (Detecting malicious behavior using global data analytics) 19 May 2014 Speaker LINX 85

Add to Reading List

Source URL: www.renesys.com

Language: English - Date: 2014-05-19 08:43:56
43Pretty Good BGP: Improving BGP by Cautiously Adopting Routes Josh Karlin

Pretty Good BGP: Improving BGP by Cautiously Adopting Routes Josh Karlin

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2008-05-05 10:08:47
44Analysis of BGP Prefix Origins During Google’s May 2005 Outage Tao Wan

Analysis of BGP Prefix Origins During Google’s May 2005 Outage Tao Wan

Add to Reading List

Source URL: www.ccsl.carleton.ca

Language: English - Date: 2011-09-09 13:57:17
45Interdomain traffic engineering with BGP B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure Abstract

Interdomain traffic engineering with BGP B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure Abstract

Add to Reading List

Source URL: www.info.ucl.ac.be

Language: English - Date: 2003-01-03 07:31:36