Cited By
View all- Wu LLin NZhang KWu Y(2024)Modeling the BGP Prefix Hijack via Pollution and Recovery ProcessesBig Data and Social Computing10.1007/978-981-97-5803-6_15(253-265)Online publication date: 1-Aug-2024
- He JLi YZhang HWang MAn CWang J(2023)Be Careful of Your Neighbors: Injected Sub-Prefix Hijacking Invisible to Public MonitorsICC 2023 - IEEE International Conference on Communications10.1109/ICC45041.2023.10278923(3774-3780)Online publication date: 28-May-2023
- Gouel MVermeulen KMouchet MRohrer JFourmaux OFriedman T(2022)Zeph & Iris map the internetACM SIGCOMM Computer Communication Review10.1145/3523230.352323252:1(2-9)Online publication date: 1-Mar-2022
- Show More Cited By