-
1
-
-
66249106227
-
A pluralist approach to interdomain communication security
-
June
-
I. Avramopoulos and J. Rexford. A pluralist approach to interdomain communication security. In Proc. NetEcon Workshop, June 2007.
-
(2007)
Proc. NetEcon Workshop
-
-
Avramopoulos, I.1
Rexford, J.2
-
2
-
-
66249140097
-
How small groups can secure interdomain routing
-
Princeton University Computer Science Department, December
-
I. Avramopoulos, M. Suchara, and J. Rexford. How small groups can secure interdomain routing. Technical Report TR-808-07, Princeton University Computer Science Department, December 2007.
-
(2007)
Technical Report TR-808-07
-
-
Avramopoulos, I.1
Suchara, M.2
Rexford, J.3
-
4
-
-
64049086532
-
How prevalent is pre-fix hijacking on the internet?
-
February
-
P. Boothe, J. Hiebert, and R. Bush. How prevalent is pre- fix hijacking on the Internet?, February 2006. NANOG 36, http://www.nanog.org/mtg-0602/boothe. html.
-
(2006)
NANOG
, vol.36
-
-
Boothe, P.1
Hiebert, J.2
Bush, R.3
-
5
-
-
85032963495
-
Design and implementation of a routing control platform
-
May
-
M. Caesar, D. Caldwell, N. Feamster, J. Rexford, A. Shaikh, and J. van der Merwe. Design and implementation of a routing control platform. In Proc. Networked Systems Design and Implementation, May 2005.
-
(2005)
Proc. Networked Systems Design and Implementation
-
-
Caesar, M.1
Caldwell, D.2
Feamster, N.3
Rexford, J.4
Shaikh, A.5
Van Der Merwe, J.6
-
6
-
-
11244271633
-
The case for separating routing from routers
-
August
-
N. Feamster, H. Balakrishnan, J. Rexford, A. Shaikh, and J. van der Merwe. The case for separating routing from routers. In Proc. ACM SIGCOMM Workshop on Future Directions in Network Architecture, August 2004.
-
(2004)
Proc. ACM SIGCOMM Workshop on Future Directions in Network Architecture
-
-
Feamster, N.1
Balakrishnan, H.2
Rexford, J.3
Shaikh, A.4
Van Der Merwe, J.5
-
7
-
-
84889052403
-
Designing extensible IP router software
-
May
-
M. Handley, E. Kohler, A. Ghosh, O. Hodson, and P. Radoslavov. Designing extensible IP router software. In Proc. Networked Systems Design and Implementation, May 2005.
-
(2005)
Proc. Networked Systems Design and Implementation
-
-
Handley, M.1
Kohler, E.2
Ghosh, A.3
Hodson, O.4
Radoslavov, P.5
-
11
-
-
84868955813
-
-
Con-Ed steals the 'Net
-
Rensys Blog. Con-Ed steals the 'Net. http: //www.renesys.com/blog/2006/ 01/coned-steals-the-net.shtml.
-
Rensys Blog
-
-
-
12
-
-
84868955813
-
-
Pakistan hijacks YouTube
-
Rensys Blog. Pakistan hijacks YouTube. http://www.renesys.com/blog/2008/ 02/pakistan-hijacks-youtube-1.shtml.
-
Rensys Blog
-
-
-
14
-
-
34248163593
-
Dynamic connectivity management with an intelligent route service control point
-
DOI 10.1145/1162638.1162643, Proceedings of the 2006 SIGCOMM Workshop on Internet Network Management, INM'06
-
J. van der Merwe et al. Dynamic connectivity management with an intelligent route service control point. In Proc. ACM SIGCOMM Workshop on Internet Network Management, September 2006. (Pubitemid 46719051)
-
(2006)
Proceedings of the 2006 SIGCOMM Workshop on Internet Network Management, INM'06
, vol.2006
, pp. 29-34
-
-
Van Der Merwe, J.1
Cepleanu, A.2
D'Souza, K.3
Freeman, B.4
Greenberg, A.5
Knight, D.6
Mcmillan, R.7
Moloney, D.8
Mulligan, J.9
Nguyen, H.10
Nguyen, M.11
Ramarajan, A.12
Saad, S.13
Satterlee, M.14
Spencer, T.15
Toll, D.16
Zelingher, S.17
-
15
-
-
85160719220
-
Wresting control from BGP: Scalable fine-grained route control
-
P. Verkaik, D. Pei, T. Scholl, A. Shaikh, A. Snoeren, and J. van der Merwe. Wresting control from BGP: Scalable fine-grained route control. In USENIX Annual Technical Conference, June 2007.
-
(2007)
USENIX Annual Technical Conference, June
-
-
P. Verkaik1
Pei, D.2
Scholl, T.3
Shaikh, A.4
Snoeren, A.5
Van Der Merwe, J.6
-
17
-
-
33749060897
-
A distributed reputation approach to cooperative internet routing protection
-
DOI 10.1109/NPSEC.2005.1532057, 1532057, 2005 First Workshop on Secure Network Protocols, NPSec, held in conjunction with ICNP 2005: 13th IEEE International Conference on Network Protocols
-
H. Yu, J. Rexford, and E. Felten. A distributed reputation approach to cooperative Internet routing protection. In Proc. Workshop on Secure Network Protocols, November 2005. (Pubitemid 44461879)
-
(2005)
2005 First Workshop on Secure Network Protocols, NPSec, held in conjunction with ICNP 2005: 13th IEEE International Conference on Network Protocols
, vol.2005
, pp. 73-78
-
-
Yu, H.1
Rexford, J.2
Felten, E.W.3
-
18
-
-
34547636852
-
Finding highly correlated pairs efficiently with powerful pruning
-
DOI 10.1145/1183614.1183640, Proceedings of the 15th ACM Conference on Information and Knowledge Management, CIKM 2006
-
J. Zhang and J. Feigenbaum. Finding highly correlated pairs efficiently with powerful pruning. In Proc. Conference on Knowledge and Information Management, pages 152-161, 2006. (Pubitemid 47203562)
-
(2006)
International Conference on Information and Knowledge Management, Proceedings
, pp. 152-161
-
-
Zhang, J.1
Feigenbaum, J.2
|