Login / Signup
BGP hijack attack policy against AS topology map.
Naoya Sekiguchi
Hidema Tanaka
Published in:
Internet Things (2024)
Keyphrases
</>
anomaly detection
countermeasures
optimal policy
maximum a posteriori
data mining
multi agent
lightweight
quality of service
infinite horizon
secret key
small world
topology preserving
detection mechanism
malicious users