H. Ballani, P. Francis, and X. Zhang, A study of prefix hijacking and interception in the Internet, Proc. ACM SIGCOMM 2007, pp.265-276, 2007.

C. Hepner and E. Zmijewski, Defending against BGP man-in-the-middle attacks, 2009.

X. Hu and Z. M. Mao, Accurate Real-time Identification of IP Prefix Hijacking, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.3-17, 2007.
DOI : 10.1109/SP.2007.7

S. Kent, C. Lynn, and K. Seo, Secure Border Gateway Protocol (SBGP), IEEE Journal on Selected Areas in Communications, vol.18, issue.4, 2000.
DOI : 10.1109/49.839934

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.108.762

A. Khan, H. Kim, T. Kwon, and Y. Choi, A comparative study on IP prefixes and their origin ases in BGP and the IRR, ACM SIGCOMM Computer Communication Review, vol.43, issue.3, pp.16-24, 2013.
DOI : 10.1145/2500098.2500101

M. Lad, D. Massey, D. Pei, Y. Wu, B. Zhang et al., PHAS: A prefix hijack alert system, Proc. 15th USENIX Security Symposium, 2006.

A. Pilosov and T. Kapela, Stealing the Internet: An Internet-scale man in the middle attack, Talk at DEFCON 16, 2008.

J. Qiu and L. Gao, Detecting bogus BGP route information: Going beyond prefix hijacking, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops, SecureComm 2007, 2007.
DOI : 10.1109/SECCOM.2007.4550358

A. Ramachandran and N. Feamster, Understanding the network-level behavior of spammers, Proc. ACM SIGCOMM, 2006.

J. Schlamp, G. Carle, and E. W. Biersack, A forensic case study on as hijacking, ACM SIGCOMM Computer Communication Review, vol.43, issue.1, pp.5-12, 2013.
DOI : 10.1145/2479957.2479959

X. Shi, Y. Xiang, Z. Wang, X. Yin, and J. Wu, Detecting prefix hijackings in the internet with argus, Proceedings of the 2012 ACM conference on Internet measurement conference, IMC '12, 2012.
DOI : 10.1145/2398776.2398779

M. Wählisch, O. Maennel, and T. C. Schmidt, Towards detecting BGP route hijacking using the RPKI, ACM SIGCOMM Computer Communication Review, vol.42, issue.4, pp.103-104, 2012.
DOI : 10.1145/2377677.2377702

Z. Zhang, Y. Zhang, Y. C. Hu, Z. M. Mao, and R. Bush, iSPY: Detecting IP Prefix Hijacking on My Own, IEEE/ACM Transactions on Networking, vol.18, issue.6, pp.1815-1828, 2010.
DOI : 10.1109/TNET.2010.2066284

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.155.5241

C. Zheng, L. Ji, D. Pei, J. Wang, and P. Francis, A light-weight distributed scheme for detecting IP prefix hijacks in real-time, Proc. ACM SIGCOMM, 2007.