Login / Signup
Investigating the Nature of Routing Anomalies: Closing in on Subprefix Hijacking Attacks.
Johann Schlamp
Ralph Holz
Oliver Gasser
Andreas Korsten
Quentin Jacquemart
Georg Carle
Ernst W. Biersack
Published in:
TMA (2015)
Keyphrases
</>
anomaly detection
network attacks
secure routing
morphological operators
security protocols
network intrusion
routing protocol
network topology
routing problem
neural network
shortest path
ad hoc networks
watermarking algorithm
wireless ad hoc networks
security risks
inter domain