Amanote Research
Register
Sign In
Optimizing BGP Security by Exploiting Path Stability
doi 10.1145/1180405.1180442
Full Text
Open PDF
Abstract
Available in
full text
Date
January 1, 2006
Authors
Kevin Butler
Patrick McDaniel
William Aiello
Publisher
ACM Press
Related search
BGP Operations and Security
Deprecation of BGP Path Attributes: DPA, ADVERTISER, and RCID_PATH / CLUSTER_ID
Path Optimizing for 3D Printing
Cyber Security Attacks: Exploiting Weaknesses
International Journal of Recent Technology and Engineering
Engineering
Management of Technology
Innovation
A Technique for Reducing BGP Update Announcements Through Path Exploration Damping
IEEE Journal on Selected Areas in Communications
Computer Networks
Electronic Engineering
Electrical
Communications
Exploiting Reconfigurable Hardware for Network Security
Exploiting the Path of Least Resistance in Evolution
Path-Vector Routing Stability Analysis
Performance Evaluation Review
Hardware
Computer Networks
Software
Architecture
Communications
Analysis of the Security of BGP/MPLS IP Virtual Private Networks (VPNs)