Amanote Research

Amanote Research

    RegisterSign In

Optimizing BGP Security by Exploiting Path Stability

doi 10.1145/1180405.1180442
Full Text
Open PDF
Abstract

Available in full text

Date

January 1, 2006

Authors
Kevin ButlerPatrick McDanielWilliam Aiello
Publisher

ACM Press


Related search

BGP Operations and Security

2015English

Deprecation of BGP Path Attributes: DPA, ADVERTISER, and RCID_PATH / CLUSTER_ID

2013English

Path Optimizing for 3D Printing

2016English

Cyber Security Attacks: Exploiting Weaknesses

International Journal of Recent Technology and Engineering
EngineeringManagement of TechnologyInnovation
2020English

A Technique for Reducing BGP Update Announcements Through Path Exploration Damping

IEEE Journal on Selected Areas in Communications
Computer NetworksElectronic EngineeringElectricalCommunications
2010English

Exploiting Reconfigurable Hardware for Network Security

English

Exploiting the Path of Least Resistance in Evolution

2008English

Path-Vector Routing Stability Analysis

Performance Evaluation Review
HardwareComputer NetworksSoftwareArchitectureCommunications
2011English

Analysis of the Security of BGP/MPLS IP Virtual Private Networks (VPNs)

2006English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy