DENG Wen-ping, LI Zhu-cun, WANG Hong, GAO Xian-ming. Characteristics Mining and Analysis for Internet Prefix Announcements[J]. Journal of Northeastern University Natural Science, 2017, 38(4): 492-496.
[1]Chen Y,Datta A K,Tixeuil H,et al.Stabilizing inter-domain routing in the Internet[J]. Journal of High Speed Networks, 2005,14(1):21-37. [2]Internet Engineering Task Force.RFC 1195:use of OSI IS-IS for routing in TCP/IP and dual environments[S].Los Angeles:IETF,1990. [3]Internet Engineering Task Force.RFC 1771:a border gateway protocol 4 (BGP-4) [S].Los Angeles:IETF,1995. [4]Internet Engineering Task Force.RFC 4272:BGP security vulnerabilities analysis[S].Los Angeles:IETF,2006. [5]Toonk A.A BGP leak made in Canada[EB/OL].(2012-08-02)[2016-11-26].http://www.bgpmon.net/a-bgp-leak-made-in-canada/. [6]黎松,诸葛建伟,李星.BGP安全研究[J].软件学报,2013,24(1):121-138.(Li Song,Zhuge Jian-wei,Li Xing.Study on BGP security[J].Journal of Software,2013,24(1):121-138.) [7]Kent S,Lynn C,Seo K.Secure border gateway protocol (S-BGP) [J].IEEE Journal on Selected Areas in Communications, 2000,18(4):582-592. [8]李琦,吴建平,徐明伟,等.自治系统间的安全路由协议GesBGP[J].计算机学报,2009(3):506-515.(Li Qi,Wu Jian-ping,Xu Ming-wei,et al.GesBGP:a good-enough-security BGP[J].Journal of Computer,2009(3):506-515.) [9]Subramanian L,Roth V,Stoica I,et al.Listen and whisper:security mechanisms for BGP[C]// Proceedings of First Symposium on Networked Systems Design and Implementation.Los Angeles:ACM Digital Library,2004:10-14. [10]Malhotra A,Goldberg S.RPKI vs ROVER:comparing the risks of BGP security solutions[J].ACM Sigcomm Computer Communication Review,2014,44(1):113-114. [11]Chi Y J,Oliveira R,Zhang L.Cyclops:the AS-level connectivity observatory[J].ACM Sigcomm Computer Communication Review, 2008,38(1):5-16. [12]胡宁,邹鹏,朱培栋.基于信誉机制的域间路由安全协同管理方法[J].软件学报,2010,21(3):505-517.(Hu Ning,Zou Peng,Zhu Pei-dong.Reputation-based collaborative management for inter-domain routing security[J].Journal of Software, 2010,21(3):505-517. [13]Lychev R,Goldberg S,Schapira M.BGP security in partial deployment:is the juice worth the squeeze?[J].ACM Sigcomm Computer Communication Review,2013,43(1):171-182. [14]Oregon.RouteViews routing table archive[EB/OL].(2005-1-23)[2016-11-26].http://www.route views.org/.(上接第491页) [5]Rauhut H,Schnass K,Vandergheynst P.Compressed sensing and redundant dictionaries[J].IEEE Transactions on Information Theory,2008,54(5):2210-2219. [6]Yang Y,Au O C,Fang L,et al.Reweighted compressive sampling for image compression[C]// Picture Coding Symposium.Chicago:IEEE,2009:1-4. [7]Stankovic L,Stankovic S,Amin M.Missing samples analysis in signals for applications to L-estimation and compressive sensing[J]. Signal Processing,2014,94(1):401-408. [8]Gutiérrez I M,Fuentes H A.Overlapped block-based compressive sensing imaging on mobile handset devices[J].Revista Facultad de Ingeniería Universidad de Antioquia,2014(70):173-184. [9]李然,干宗良,朱秀昌.基于分块压缩感知的图像全局重构模型[J].信号处理,2012,28(10):1416-1422.(Li Ran,Gan Zong-liang,Zhu Xiu-chang.A global reconstruction model of images using block compressed sensing[J].Signal Processing,2012,28(10):1416-1422.) [10]罗琦,魏倩,缪昕杰.基于压缩感知思想的图像分块压缩与重构方法[J].中国科学:信息科学,2014,44(8):1036-1047.(Luo Qi,Wei Qian,Miao Xin-jie.Blocked image compression and reconstruction algorithm based on compressed sensing[J].Scientia Sinica Informationis,2014,44(8):1036-1047.) [11]Kapoor A,Dhir R.Image compression using fast 2-D DCT technique[J].International Journal on Computer Science & Engineering, 2011,3(6):2415-2419.