共 50 条
- [31] "BGP-Hijacking" Attacks: Theoretical Basis and Practical Scenarios [J]. PROCEEDINGS OF THE 2017 IEEE RUSSIA SECTION YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING CONFERENCE (2017 ELCONRUS), 2017, : 208 - 212
- [32] Internet resiliency to attacks and failures under BGP policy routing [J]. COMPUTER NETWORKS, 2006, 50 (16) : 3183 - 3196
- [33] The temporal and topological characteristics of BGP path changes [J]. 11TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS, PROCEEDINGS, 2003, : 190 - 199
- [34] BGPViewer: Using Graph representations to explore BGP routing changes [J]. 2013 18TH INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING (DSP), 2013,
- [35] Detecting False Data Injection Attacks using Spatial-temporal Graph Neural Network [J]. 2023 IEEE 12TH DATA DRIVEN CONTROL AND LEARNING SYSTEMS CONFERENCE, DDCLS, 2023, : 338 - 343
- [38] On Detecting Code Reuse Attacks [J]. Automatic Control and Computer Sciences, 2020, 54 : 573 - 583
- [39] Understanding and Detecting Majority Attacks [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON DECENTRALIZED APPLICATIONS AND INFRASTRUCTURES (DAPPS 2020), 2020, : 11 - 21
- [40] Detecting DNS Amplification Attacks [J]. CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2008, 5141 : 185 - 196