暂无分享,去创建一个
[1] Albert-László Barabási,et al. Statistical mechanics of complex networks , 2001, ArXiv.
[2] Lixia Zhang,et al. Cyclops: the AS-level connectivity observatory , 2008, CCRV.
[3] Susan Hares,et al. Terminology for Benchmarking BGP Device Convergence in the Control Plane , 2005, RFC.
[4] Walter Willinger,et al. The origin of power laws in Internet topologies revisited , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[5] Daniel Massey,et al. PHAS: A Prefix Hijack Alert System , 2006, USENIX Security Symposium.
[6] Vinton G. Cerf,et al. A brief history of the internet , 1999, CCRV.
[7] Hans-Werner Braun,et al. The NLANR network analysis infrastructure , 2000, IEEE Commun. Mag..
[8] David Moore,et al. Internet quarantine: requirements for containing self-propagating code , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[9] Tony Bates,et al. Guidelines for creation, selection, and registration of an Autonomous System (AS) , 1996, RFC.
[10] Zhuoqing Morley Mao,et al. Practical defenses against BGP prefix hijacking , 2007, CoNEXT '07.
[11] Farnam Jahanian,et al. Internet routing instability , 1997, SIGCOMM '97.
[12] Anja Feldmann,et al. There is more to IXPs than meets the eye , 2013, CCRV.
[13] Zhen Wu,et al. BGP routing dynamics revisited , 2007, CCRV.
[14] Enrico Gregori,et al. On the incompleteness of the AS-level graph: a novel methodology for BGP route collector placement , 2012, Internet Measurement Conference.
[15] Michalis Faloutsos,et al. On power-law relationships of the Internet topology , 1999, SIGCOMM '99.
[16] Vinod Yegneswaran,et al. Internet intrusions: global characteristics and prevalence , 2003, SIGMETRICS '03.
[17] Lixia Zhang,et al. The (In)Completeness of the Observed Internet AS-level Structure , 2010, IEEE/ACM Transactions on Networking.
[18] Lixin Gao,et al. Detecting bogus BGP route information: Going beyond prefix hijacking , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[19] Manish Karir,et al. Multi-Threaded Routing Toolkit (MRT) Routing Information Export Format , 2011, RFC.
[20] Yihua He,et al. Lord of the Links: A Framework for Discovering Missing Links in the Internet Topology , 2009, IEEE/ACM Transactions on Networking.
[21] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[22] Lixin Gao. On inferring autonomous system relationships in the internet , 2001, TNET.