共 50 条
- [1] Detecting selective dropping attacks in BGP [J]. 31ST IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2006, : 959 - +
- [3] Detecting BGP misconfiguration for BGP/MPLS VPNs [J]. PDCAT 2005: SIXTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2005, : 168 - 170
- [5] Detecting the Unintended in BGP Policies [J]. 2012 20TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2012,
- [6] Detecting BGP anomalies with wavelet [J]. 2008 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS 1 AND 2, 2008, : 465 - 472
- [7] BGP Attacks and Countermeasures in Heterogeneous Networks [J]. 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2334 - +
- [8] A Taxonomy of Attacks Using BGP Blackholing [J]. COMPUTER SECURITY - ESORICS 2019, PT I, 2019, 11735 : 107 - 127
- [9] Detecting BGP Anomalies based on Spatio-Temporal Feature Representation Model for Autonomous Systems [J]. 2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 404 - 411
- [10] A Temporal Recurrent Neural Network Approach to Detecting Market Anomaly Attacks [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2018, : 160 - 162