@dblp

Investigating the Nature of Routing Anomalies: Closing in on Subprefix Hijacking Attacks.

, , , , , , and . TMA, volume 9053 of Lecture Notes in Computer Science, page 173-187. Springer, (2015)

Links and resources

Tags