Journal articles on the topic 'BGP Border gateway protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'BGP Border gateway protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Alotaibi, Hamad Saud, Mark A. Gregory, and Shuo Li. "Multidomain SDN-Based Gateways and Border Gateway Protocol." Journal of Computer Networks and Communications 2022 (May 12, 2022): 1–23. http://dx.doi.org/10.1155/2022/3955800.
Full textAgarwal, Arushi, and Ayushi Pandey. "Reducing convergence time along with improvement in path service quality of border gateway protocol." International Journal of Engineering & Technology 7, no. 2.31 (2018): 203. http://dx.doi.org/10.14419/ijet.v7i2.31.13441.
Full textKent, S., C. Lynn, and K. Seo. "Secure Border Gateway Protocol (S-BGP)." IEEE Journal on Selected Areas in Communications 18, no. 4 (2000): 582–92. http://dx.doi.org/10.1109/49.839934.
Full textMastilak, Lukas, Marek Galinski, Pavol Helebrandt, Ivan Kotuliak, and Michal Ries. "Enhancing Border Gateway Protocol Security Using Public Blockchain." Sensors 20, no. 16 (2020): 4482. http://dx.doi.org/10.3390/s20164482.
Full textDevikar, Rohit Nilkanth, D. V. Patil, and V. Chandraprakash. "Study of BGP Convergence Time." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 1 (2016): 413. http://dx.doi.org/10.11591/ijece.v6i1.8106.
Full textDevikar, Rohit Nilkanth, D. V. Patil, and V. Chandraprakash. "Study of BGP Convergence Time." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 1 (2016): 413. http://dx.doi.org/10.11591/ijece.v6i1.pp413-420.
Full textBhagat, Nikhil. "Evolving from Legacy Protocols: Transitioning from RIP and EIGRP to OSPF, IS-IS and BGP." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–6. https://doi.org/10.55041/ijsrem10558.
Full textScott, Ben A., Michael N. Johnstone, and Patryk Szewczyk. "A Survey of Advanced Border Gateway Protocol Attack Detection Techniques." Sensors 24, no. 19 (2024): 6414. http://dx.doi.org/10.3390/s24196414.
Full textZamany, Muhammad Arif Zaky, Hendra Supendar, and Sulistianto Sutrisno Wanda. "OPTIMALISASI ROUTING MENGGUNAKAN SATU AUTONOMOUS SYSTEM NUMBER (ASN) BORDER GATEWAY PROTOCOL (BGP)." JEIS: JURNAL ELEKTRO DAN INFORMATIKA SWADHARMA 2, no. 1 (2022): 48–56. http://dx.doi.org/10.56486/jeis.vol2no1.158.
Full textAzhari, Muhammad Ikhsan, Tengku Mohd Diansyah, and Ari Usman. "PERBANDINGAN ROUTING PROTOCOL EXTERIOR BGP VERSI 4 DENGAN ROUTING INTERIOR EIGRP PADA ALGORITMA LINKSTATE MENGGUNAKAN PARAMETER PACKET LOSS." JURNAL TEKNOLOGI INFORMASI 3, no. 2 (2019): 185. http://dx.doi.org/10.36294/jurti.v3i2.1071.
Full textMarcus, Ronald David, and Eleazar Tfuakani. "Perancangan Jaringan Skala Besar dengan Menggunakan Metode Border Gateway Protocol (BGP) Berbasis Mikrotik." Briliant: Jurnal Riset dan Konseptual 4, no. 3 (2019): 401. http://dx.doi.org/10.28926/briliant.v4i3.361.
Full textMusril, Hari Antoni. "SIMULASI INTERKONEKSI ANTARA AUTONOMOUS SYSTEM (AS) MENGGUNAKAN BORDER GATEWAY PROTOCOL (BGP)." InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan) 2, no. 1 (2017): 1–9. http://dx.doi.org/10.30743/infotekjar.v2i1.151.
Full textBaggan, Vidhu, Devendra Prasad, and Prabhjot Kaur. "Fast Network Path Restoration Through Modified Finite State Machine Model in Border Gateway Protocol." Journal of Computational and Theoretical Nanoscience 16, no. 10 (2019): 4394–99. http://dx.doi.org/10.1166/jctn.2019.8531.
Full textProf Dr Aftab Malik, Dr. Haroon Ur-Rashid Rashid, and Waqar Azeem. "ANALYSIS OF BORDER GATEWAY PROTOCOL, ITS TYPES AND MEASURES TO AVOID RISK." Lahore Garrison University Research Journal of Computer Science and Information Technology 3, no. 3 (2019): 3–9. http://dx.doi.org/10.54692/lgurjcsit.2019.030379.
Full textDevikar, Rohit Nilkanth, Dipak V. Patil, and V. Chandraprakash. "Study of BGP Convergence Time: A Survey." TELKOMNIKA Indonesian Journal of Electrical Engineering 16, no. 2 (2015): 341. http://dx.doi.org/10.11591/tijee.v16i2.1622.
Full textShukla, Shipra, and Mahesh Kumar. "Optimized MRAI Timers for Border Gateway Protocol in Large Networks." International Journal of Distributed Systems and Technologies 10, no. 4 (2019): 31–44. http://dx.doi.org/10.4018/ijdst.2019100103.
Full textclaffy, kc. "Border gateway protocol (BGP) and traceroute data workshop report." ACM SIGCOMM Computer Communication Review 42, no. 3 (2012): 28–31. http://dx.doi.org/10.1145/2317307.2317313.
Full textZang, Jinhu, and Shiyu Song. "A Border Gateway Protocol LRA-BGP for Integrated Satellite-terrestrial Networks." Journal of Physics: Conference Series 2450, no. 1 (2023): 012049. http://dx.doi.org/10.1088/1742-6596/2450/1/012049.
Full textAl-Musawi, Bahaa Qasim, and Philip Branch. "Identifying Recurrence Behaviour in the Underlying BGP Traffic." International Journal of Information, Communication Technology and Applications 4, no. 1 (2018): 34–47. http://dx.doi.org/10.17972/ijicta20184142.
Full textDeepak Malik and Dr. Bijendra Singh. "Optimizing OSPF Cost Value for Best Path Selection Using Metric-Type Variation." International Research Journal on Advanced Engineering Hub (IRJAEH) 2, no. 06 (2024): 1845–54. http://dx.doi.org/10.47392/irjaeh.2024.0254.
Full textPratama, I. Putu Agus Eka. "Design and Implementation of SDN IP Based on Open Network Operating System and Border Gateway Protocol." Bulletin of Computer Science and Electrical Engineering 2, no. 2 (2021): 56–66. http://dx.doi.org/10.25008/bcsee.v2i2.1145.
Full textChen, Yu, Ajoy K. Datta, and Sébastien Tixeuil. "Stabilizing inter-domain routing in the Internet." Journal of High Speed Networks 14, no. 1 (2005): 21–37. https://doi.org/10.3233/hsn-2005-253.
Full textPutra, Eko Kurniawanto. "IMPLEMENTASI ROUTING PROTOKOL BORDER GATEWAY PROTOCOL (BGP) PADA ROUTER MIKROTIK RB 2011 DI KOMINFO KABUPATEN SOLOK SELATAN." Jurnal Teknoif Teknik Informatika Institut Teknologi Padang 9, no. 2 (2021): 97–103. http://dx.doi.org/10.21063/jtif.2021.v9.2.97-103.
Full textAyesha Nasir and Unsa Tariq. "A Comparative Study of Routing Protocols Including RIP, OSPF and BGP." Lahore Garrison University Research Journal of Computer Science and Information Technology 2, no. 2 (2018): 47–56. http://dx.doi.org/10.54692/lgurjcsit.2018.020236.
Full textKriswantono, Andi, Arief Setyanto, and Suwanto Raharjo. "Kinerja Quagga Pada Routing BGP IPv6 Menggunakan Metode Dual Stack." Creative Information Technology Journal 5, no. 1 (2019): 28. http://dx.doi.org/10.24076/citec.2017v5i1.141.
Full textNicholes, Martin O., and Biswanath Mukherjee. "A survey of security techniques for the border gateway protocol (BGP)." IEEE Communications Surveys & Tutorials 11, no. 1 (2009): 52–65. http://dx.doi.org/10.1109/surv.2009.090105.
Full textAbugharsa, Afif, Bashir Elkharraz, and Eltohami Elghoul. "BGP Prefix Hijacking Attack and its Prevention Methods." International Journal of Advanced Networking and Applications 16, no. 02 (2024): 6328–31. http://dx.doi.org/10.35444/ijana.2024.16203.
Full textShahid, Kamal, Saleem Naseer Ahmad, and Syed Tahir Hussain Rizvi. "Optimizing Network Performance: A Comparative Analysis of EIGRP, OSPF, and BGP in IPv6-Based Load-Sharing and Link-Failover Systems." Future Internet 16, no. 9 (2024): 339. http://dx.doi.org/10.3390/fi16090339.
Full textLi, Peipei, Bin Lu, and Daofeng Li. "BGP Neighbor Trust Establishment Mechanism Based on the Bargaining Game." Information 12, no. 3 (2021): 110. http://dx.doi.org/10.3390/info12030110.
Full textShen, Chen, Ruixin Wang, Xiang Li, Peiying Zhang, Kai Liu, and Lizhuang Tan. "Border Gateway Protocol Route Leak Detection Technique Based on Graph Features and Machine Learning." Electronics 13, no. 20 (2024): 4072. http://dx.doi.org/10.3390/electronics13204072.
Full textTkalec, Gordana, Iva Rosanda Žigo, and Žarka Dolinara. "Implementing a Simulation Model for the Evaluation of BGP Updates Impact on Real-Time Applications." European Journal of Interdisciplinary Studies 3, no. 2 (2017): 105. http://dx.doi.org/10.26417/ejis.v3i2.p105-111.
Full textHoxha, Ledina. "Implementing a Simulation Model for the Evaluation of BGP Updates Impact on Real-Time Applications." European Journal of Formal Sciences and Engineering 6, no. 1 (2023): 101–15. http://dx.doi.org/10.2478/ejfe-2023-0009.
Full textAmin, Sadia, Saira Ahthasham, Aftab Ahmed Shaikh, Ahthasham Sajid, and Mirza Aamir Mehmood. "Improvement of BGP Session Maintenance." International Journal of Engineering & Technology 1, no. 2 (2012): 94. http://dx.doi.org/10.14419/ijet.v1i2.77.
Full textBudi Rahayu, Tri, and Imam Suharjo. "Implementasi BGP dengan RPKI Pada Jaringan PT. Bintang Mataram Teknologi Menggunakan Mikrotik Router OS." JURNAL FASILKOM 14, no. 2 (2024): 293–300. https://doi.org/10.37859/jf.v14i2.6968.
Full textSharma, Ankita. "COMPARATIVE STUDY OF OSPF AND BGP FOR HYBRID CLOUD CONNECTIVITY." International Research Journal of Computer Science 09, no. 07 (2022): 170–74. http://dx.doi.org/10.26562/irjcs.2022.v0907.008.
Full textOlajide Soji Osundare and Adebimpe Bolatito Ige. "Optimizing network performance in large financial enterprises using BGP and VRF-lite." International Journal of Scholarly Research in Science and Technology 5, no. 1 (2024): 018–25. http://dx.doi.org/10.56781/ijsrst.2024.5.1.0030.
Full textYu, Bo, Xingyuan Liu, and Xiaofeng Wang. "RPKI Defense Capability Simulation Method Based on Container Virtualization." Applied Sciences 14, no. 18 (2024): 8408. http://dx.doi.org/10.3390/app14188408.
Full textDarmawan, Darmawan, and Teguh Imanto. "Analisa Link Balancing dan Failover 2 Provider Menggunakan Border Gateway Protocol (BGP) Pada Router Cisco 7606s." Jurnal Nasional Teknologi dan Sistem Informasi 3, no. 3 (2017): 326–33. http://dx.doi.org/10.25077/teknosi.v3i3.2017.326-333.
Full textNurhidayah, Muhammad Sahal, Dadiek Pranindito, and Reni Dyah Wahyuningrum. "Analisis dan Simulasi Routing Border Gateway Protocol (BGP) antar Autonomous System menggunakan Free Range Routing (FRR)." Jurnal Litek : Jurnal Listrik Telekomunikasi Elektronika 19, no. 2 (2022): 48–56. http://dx.doi.org/10.30811/litek.v19i2.11.
Full textSaiful Do. Abdullah, Alan Wahyudin Nur, Hairil Kurniadi Siradjuddin, Rosihan, and Adelina Ibrahim. "Analysis and Design of Cisco Packet Tracer Interconnections Between Autonomous Systems (AS) Using the Border Gateway Protocol at Campus 3 Khairun University." Technium: Romanian Journal of Applied Sciences and Technology 17 (November 1, 2023): 205–8. http://dx.doi.org/10.47577/technium.v17i.10075.
Full textKong, Lingjing, and Hong Shen. "Achieving inter-domain routing security based on distributed translator trust model." Computer Science and Information Systems 12, no. 4 (2015): 1327–44. http://dx.doi.org/10.2298/csis140910057k.
Full textYu, Chao, Xing Wei Wang, and Min Huang. "A BGP Fast Convergence Mechanism Based on Doubtful Path Judgment." Applied Mechanics and Materials 602-605 (August 2014): 3067–70. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.3067.
Full textRomo-Chavero, Maria Andrea, Jose Antonio Cantoral-Ceballos, Jesus Arturo Pérez-Díaz, and Carlos Martinez-Cagnazzo. "Median Absolute Deviation for BGP Anomaly Detection." Future Internet 16, no. 5 (2024): 146. http://dx.doi.org/10.3390/fi16050146.
Full textda Silva, Brivaldo Alves, Adriano Bastos de Carvalho, Italo Cunha, Timur Friedman, Ethan Katz-Bassett, and Ronaldo Alves Ferreira. "Uncovering BGP Action Communities and Community Squatters in the Wild." Proceedings of the ACM on Measurement and Analysis of Computing Systems 8, no. 3 (2024): 1–23. https://doi.org/10.1145/3700431.
Full textSaid, Muhammad Ali, Setyorini Setyorini, and Erwid M. Jadied. "Analysis of IPSec Implementation on Dynamic Multipoint VPN Protocol Using Routing Border Gateway Protocol." Building of Informatics, Technology and Science (BITS) 4, no. 2 (2022): 595–605. http://dx.doi.org/10.47065/bits.v4i2.1836.
Full textOti, Stephen Brako, and James Ben Hayfron-Acquah. "Practical Security Approaches against Border Gateway Protocol (BGP) Session Hijacking Attacks between Autonomous Systems." Journal of Computer and Communications 02, no. 08 (2014): 10–21. http://dx.doi.org/10.4236/jcc.2014.28002.
Full textCarl, Glenn, and George Kesidis. "Large-scale testing of the Internet's Border Gateway Protocol (BGP) via topological scale-down." ACM Transactions on Modeling and Computer Simulation 18, no. 3 (2008): 1–30. http://dx.doi.org/10.1145/1371574.1371577.
Full textZhang, Jun, and Fu Xiang Peng. "Routing Strategy and Quality of Service (QoS) Realization Research of Guangxi Meteorology Network." Advanced Engineering Forum 6-7 (September 2012): 919–23. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.919.
Full textFathurohman, Akhmad, and Safuan Safuan. "Implementation of the Border Gateway Protocol (BGP) Protocol in the Public Network of the Universitas Muhammadiyah Semarang." Journal of Intelligent Computing & Health Informatics 2, no. 1 (2021): 12. http://dx.doi.org/10.26714/jichi.v2i1.7445.
Full textSchapira, Michael. "Combatting internet time shifters." Project Repository Journal 10, no. 1 (2021): 8–11. http://dx.doi.org/10.54050/prj10008011.
Full text