[1] Sermpezis P, Kotronis V, Dainotti A, et al. A survey among network operators on BGP prefix hijacking[J]. ACM SIGCOMM Computer Communication Review, 2018, 48(1):64-69. [2] Florian S, Franziska L, Robert B, et al. BGP communities:even more worms in the routing can[C]//Internet Measurement Conference. Boston:ACM Press, 2018:279-292. [3] Brivaldo J, Ronaldo A F, Italo C, et al. High-fidelity interdomain routing experiments[C]//ACM SIGCOMM Conference on Posters and Demos. Budapest:ACM Press, 2018:36-38. [4] Li Heshuai, Zhu Junhu, Wang Qingxian, et al. LAAEM:a method to enhance LDoS attack[J]. IEEE Communications Letters, 2016, 20(4):708-711. [5] Motivala M, Elmore M, Feamster N, et al. Path splicing[J]. ACM SIGCOMM Computer Communication Review, 2008, 38(4):27-38. [6] 孙子文, 张炎棋, 徐宜敏. 一种采用混合抗干扰方法的路由恢复机制[J]. 系统仿真学报, 2019, 32(5):874-884. Sun Ziwen, Zhang Yanqi, Xu Yimin. A route recovery mechanism using hybrid anti-interference method[J]. Journal of System Simulation, 2019, 32(5):874-884. [7] Gopalan A, Ramasubramanian S. IP fast rerouting and disjoint multipath routing with three edge-independent spanning trees[J]. IEEE/ACM Transactions on Networking, 2016, 24(3):1336-1349. [8] 陈文龙, 赵一荣, 肖融, 等. 基于虚拟拓扑的多级可信传输体系及路由计算[J]. 计算机研究与发展, 2018, 55(4):729-737. Chen Wenlong, Zhao Yirong, Xiao Rong, et al. Packets transmission with multiple levels of credibility and routing calculation based on virtual topologies[J]. Journal of Computer Research and Development, 2018, 55(4):729-737. [9] CAIDA. CAIDA's internet topology data comparison[EB/OL]. 2012(2012-05-15)[2019-08-26]. http://www.caida.org/research/topology/topo_comparison. [10] Raidl G R. Edge sets:an effective evolutionary coding of spanning trees[J]. IEEE Transactions on Evolutionary Computation, 2003, 7(3):225-239. [11] Thang N B, Xianghua D, Catherine M Z. An improved ant-based algorithm for the degree-constrained minimum spanning tree problem[J]. IEEE Transactions on Evolutionary Computation, 2012, 16(2):266-278. [12] Singh K, Sundar S. A hybrid genetic algorithm for the degree-constrained minimum spanning tree problem[J]. Soft Computing, 2019, 24, 2169-2186. |