How to Prevent AS Hijacking Attacks

doi 10.1145/2413247.2413265
Full Text
Abstract

Available in full text

Date
Authors
Publisher

ACM Press