IP hijacking

Results: 109



#Item
1ARTEMIS: Real-Time Detection and Automatic Mitigation for BGP Prefix Hijacking Gavriil Chaviaras, Petros Gigis, Pavlos Sermpezis, and Xenofontas Dimitropoulos FORTH / University of Crete, Greece  {gchaviaras, gkigkis, se

ARTEMIS: Real-Time Detection and Automatic Mitigation for BGP Prefix Hijacking Gavriil Chaviaras, Petros Gigis, Pavlos Sermpezis, and Xenofontas Dimitropoulos FORTH / University of Crete, Greece {gchaviaras, gkigkis, se

Add to Reading List

Source URL: www.inspire.edu.gr

Language: English - Date: 2016-06-27 04:34:24
2Stealing The Internet  An Internet-Scale  Man In The Middle Attack   Defcon 16, Las Vegas, NV - August 10th, 2008

Stealing The Internet An Internet-Scale Man In The Middle Attack Defcon 16, Las Vegas, NV - August 10th, 2008

Add to Reading List

Source URL: we.riseup.net

Language: English - Date: 2011-01-17 04:39:11
3TO P U S E C AS E S  WHAT YOU CAN DO WITH KENTIK DETECT Kentik Detect helps industry leaders like Yelp, Neustar, Dailymotion, and Pandora achieve better business results by unlocking the value of network data. Delivering

TO P U S E C AS E S WHAT YOU CAN DO WITH KENTIK DETECT Kentik Detect helps industry leaders like Yelp, Neustar, Dailymotion, and Pandora achieve better business results by unlocking the value of network data. Delivering

Add to Reading List

Source URL: www.kentik.com

Language: English - Date: 2016-07-14 17:33:25
4Security and Predictability: Two Missing Pieces in BGP Lakshmi Subramanian UC Berkeley 1  Introduction

Security and Predictability: Two Missing Pieces in BGP Lakshmi Subramanian UC Berkeley 1 Introduction

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2004-05-12 22:28:16
5Outsourcing the Routing Control Logic: Better Internet Routing Based on SDN Principles Vasileios Kotronis ETH Zurich Zurich, Switzerland

Outsourcing the Routing Control Logic: Better Internet Routing Based on SDN Principles Vasileios Kotronis ETH Zurich Zurich, Switzerland

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2012-10-19 18:32:37
6RiPKI: The Tragic Story of RPKI Deployment in the Web Ecosystem Matthias Wählisch Robert Schmidt

RiPKI: The Tragic Story of RPKI Deployment in the Web Ecosystem Matthias Wählisch Robert Schmidt

Add to Reading List

Source URL: www.eecs.qmul.ac.uk

Language: English - Date: 2015-10-23 03:22:22
7Interdomain Routing Streams Timothy G. Griffin∗ Zhuoqing Morley Mao†  Abstract

Interdomain Routing Streams Timothy G. Griffin∗ Zhuoqing Morley Mao† Abstract

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2004-05-07 19:48:08
8Hijacking Bitcoin: Large-scale Network Attacks on Cryptocurrencies Maria Apostolaki Aviv Zohar

Hijacking Bitcoin: Large-scale Network Attacks on Cryptocurrencies Maria Apostolaki Aviv Zohar

Add to Reading List

Source URL: vanbever.eu

Language: English - Date: 2016-05-29 05:12:22
9BGP Policy violations in the data-plane Pierre Francois, Institute IMDEA Networks Paolo Lucente, PMACCT

BGP Policy violations in the data-plane Pierre Francois, Institute IMDEA Networks Paolo Lucente, PMACCT

Add to Reading List

Source URL: www.pmacct.net

Language: English - Date: 2011-11-01 05:09:41
10Distributed Route Aggregation on the Global Network (DRAGON) João Luís Sobrinho1 Laurent Vanbever2, Franck Le3, Jennifer Rexford2 1Instituto

Distributed Route Aggregation on the Global Network (DRAGON) João Luís Sobrinho1 Laurent Vanbever2, Franck Le3, Jennifer Rexford2 1Instituto

Add to Reading List

Source URL: route-aggregation.net

Language: English - Date: 2015-02-26 03:41:32