Workshop on internet economics (WIE2013) report
暂无分享,去创建一个
[1] J. S. Marcus,et al. Network Operators and Content Providers: Who Bears the Cost? , 2011 .
[2] Lawrence K. Saul,et al. From .academy to .zone: An Analysis of the New TLD Land Rush , 2015, Internet Measurement Conference.
[3] Ignacio Castro,et al. CIPT: using tuangou to reduce IP transit costs , 2011, CoNEXT '11.
[4] A. D’Ignazio,et al. 'Unfair' Discrimination in Two-Sided Peering? Evidence from Linx , 2006 .
[5] Danny McPherson,et al. Problem Definition and Classification of BGP Route Leaks , 2016, RFC.
[6] Kimberly C. Claffy. Workshop on internet economics (WIE2009) report , 2010, CCRV.
[7] Fred Baker,et al. Ingress Filtering for Multihomed Networks , 2004, RFC.
[8] Rob Frieden. The mixed blessing of a deregulatory endpoint for the public switched telephone network , 2013 .
[9] Steven Bauer,et al. The Road to an Open Internet is Paved with Pragmatic Disclosure & Transparency Policies , 2015 .
[10] Aiko Pras,et al. A High-Performance, Scalable Infrastructure for Large-Scale Active DNS Measurements , 2016, IEEE Journal on Selected Areas in Communications.
[11] Kimberly C. Claffy. Workshop on internet economics (WIE2011) report , 2012, CCRV.
[13] Roger Anderson,et al. Homeland Security , 2004, Gov. Inf. Q..
[14] K. Claffy,et al. Adding Enhanced Services to the Internet: Lessons from History , 2015 .
[15] D. Clark,et al. Interconnection in the Internet: The Policy Challenge , 2011 .
[16] John C.-I. Chuang,et al. Loci of competition for future internet architectures , 2011, IEEE Communications Magazine.
[17] Stephen J. Schultze,et al. Next generation connectivity: a review of broadband internet transitions and policy from around the world , 2010 .
[18] Barbara A. Cherry. Radical Experimentation Under Deregulatory Broadband Policies: The Rise of Shadow Common Carriers , 2011 .
[19] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[20] Kimberly C. Claffy,et al. Dialing Privacy and Utility: A Proposed Data-Sharing Framework to Advance Internet Research , 2010, IEEE Security & Privacy.
[21] Amogh Dhamdhere,et al. The Internet is flat: modeling the transition from a transit hierarchy to a peering mesh , 2010, CoNEXT.
[22] Sharon Goldberg,et al. Let the market drive deployment: a strategy for transitioning to BGP security , 2011, SIGCOMM.
[23] Stefan Savage,et al. XXXtortion?: inferring registration intent in the .XXX TLD , 2014, WWW.
[24] Marcelo Bagnulo,et al. A Framework for Large-Scale Measurement of Broadband Performance (LMAP) , 2015, RFC.
[25] Christian Rossow,et al. Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks , 2014, WOOT.
[26] Vasileios Giotsas,et al. Mapping peering interconnections to a facility , 2015, CoNEXT.
[27] Ignacio Castro,et al. T4P: Hybrid interconnection for cost reduction , 2012, 2012 Proceedings IEEE INFOCOM Workshops.
[28] Ítalo S. Cunha,et al. Sibyl: A Practical Internet Route Oracle , 2016, NSDI.
[29] Paul Vixie,et al. Rate-limiting State , 2014, ACM Queue.
[30] Vasileios Giotsas,et al. AS relationships, customer cones, and validation , 2013, Internet Measurement Conference.
[31] Amogh Dhamdhere,et al. A value-based framework for internet peering agreements , 2010, 2010 22nd International Teletraffic Congress (lTC 22).
[32] Vasileios Giotsas,et al. Periscope: Unifying Looking Glass Querying , 2016, PAM.
[33] Scott E. Coull,et al. A Qualitative Risk Assessment Framework for Sharing Computer Network Data , 2012 .
[34] Nick Feamster,et al. Towards a cost model for network traffic , 2012, CCRV.
[35] Vasileios Giotsas,et al. Inferring Complex AS Relationships , 2014, Internet Measurement Conference.