Hacking exposed: network security secrets and solutions, 2009. ,
Leveraging BGP Dynamics to Reverse-Engineer Routing Policies, 2006. ,
Analyzing BGP policies: methodology and tool, IEEE INFOCOM 2004, pp.1640-1651, 2004. ,
DOI : 10.1109/INFCOM.2004.1354576
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.3202
Computing the Types of the Relationships Between Autonomous Systems, IEEE/ACM Transactions on Networking, vol.15, issue.2, pp.267-280, 2007. ,
DOI : 10.1109/TNET.2007.892878
Wheel + Ring = Reel: The Impact of Route Filtering on the Stability of Policy Routing, IEEE/ACM Transactions on Networking, vol.19, issue.4, pp.1085-1096, 2011. ,
DOI : 10.1109/TNET.2011.2106798
Security Analysis of the MPLS Label Distribution Protocol, 2010. ,
DOI : 10.1007/978-3-642-16806-2_9
Analysis of security threats to MPLS virtual private networks, International Journal of Critical Infrastructure Protection, vol.2, issue.4, pp.146-153, 2009. ,
DOI : 10.1016/j.ijcip.2009.08.002
Fluctuations and Lasting Trends of QoS on Intercontinental Links, Quality of Service in Heterogeneous Networks, pp.251-264, 2009. ,
DOI : 10.1007/978-3-642-10625-5_16
An Overview of Quality of Service (QoS) and QoS Routing in Communication Networks, 4th PGNET2003 Symposium, pp.236-242, 2003. ,
Integrated service in the internet architecture: an overview, Program on Internet and Telecoms Convergence, 1994. ,
DOI : 10.17487/rfc1633
Security analysis of RSVP-TE signaling in MPLS networks, International Journal of Critical Infrastructure Protection, vol.1, issue.1, pp.68-74, 2008. ,
DOI : 10.1016/j.ijcip.2008.08.005
Security Verification of a Virtual Private Network over MPLS, Network Control and Engineering for QoS, Security, and Mobility IV, pp.339-353, 2007. ,
DOI : 10.1007/978-0-387-49690-0_27
On inferring and characterizing internet routing policies, Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement, pp.15-26, 2003. ,
DOI : 10.1109/jcn.2007.6182869
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1026.2998
On reverse engineering the management actions from observed BGP data, In: INFOCOM Workshops, pp.1-6, 2008. ,
BPG routing policies in ISP networks, IEEE Network, vol.19, issue.6, pp.5-11, 2005. ,
DOI : 10.1109/MNET.2005.1541715
Understanding BGP misconfiguration, ACM SIGCOMM Computer Communication Review, vol.32, issue.4, pp.3-16, 2002. ,
DOI : 10.1145/964725.633027
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.1862
Internet traffic engineering using multi-protocol label switching (MPLS), Computer Networks, vol.40, issue.1, pp.111-129, 2002. ,
DOI : 10.1016/S1389-1286(02)00269-4
The Network Simulator -ns-2, 2014. ,
Securing the MPLS Control Plane, High Performance Computing and Communications, pp.511-523, 2005. ,
DOI : 10.1007/11557654_60
A Security Analysis of MPLS Service Degradation Attacks Based on Restricted Adversary Models, In: Information Security in Diverse Computing Environments, 2014. ,
DOI : 10.4018/978-1-4666-6158-5.ch008