Quality of service: delivering QoS on the Internet and in corporate networks P Ferguson, G Huston John Wiley & Sons, Inc., 1998 | 760 | 1998 |
Interconnection, peering, and settlements G Huston proc. INET 9, 1, 1999 | 420 | 1999 |
Next steps for the IP QoS architecture G Huston | 280 | 2000 |
Analyzing the Internet’s BGP routing table G Huston The Internet Protocol Journal 4 (1), 2-15, 2001 | 273 | 2001 |
What is a VPN? P Ferguson, G Huston Revision 1 (01), 01-22, 1998 | 209 | 1998 |
Internet background radiation revisited E Wustrow, M Karir, M Bailey, F Jahanian, G Huston Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 62-74, 2010 | 204 | 2010 |
IPv4 address report G Huston http://www. potaroo. net/tools/ipv4/, 2008 | 190 | 2008 |
ISP survival guide: strategies for running a competitive ISP G Huston John Wiley & Sons, Inc., 1998 | 185 | 1998 |
IPv4 address allocation and the BGP routing table evolution X Meng, Z Xu, B Zhang, G Huston, S Lu, L Zhang ACM SIGCOMM Computer Communication Review 35 (1), 71-80, 2005 | 166 | 2005 |
Internet performance survival guide: QoS strategies for multiservice networks G Huston John Wiley & Sons, Inc., 2000 | 152 | 2000 |
Securing BGP—A literature survey G Huston, M Rossi, G Armitage IEEE Communications Surveys & Tutorials 13 (2), 199-222, 2010 | 150 | 2010 |
Commentary on inter-domain routing in the Internet G Huston | 120 | 2001 |
The cidr report T Bates, P Smith, G Huston | 95 | 1998 |
BGP routing table analysis reports G Huston http://bgp. potaroo. net/, 2011 | 92 | 2011 |
Quality of service in the internet: Fact, fiction, or compromise? P Ferguson, G Huston AUUGN, 231, 1998 | 87 | 1998 |
TCP in a wireless world G Huston IEEE Internet computing 5 (2), 82-84, 2001 | 80 | 2001 |
A profile for X. 509 PKIX resource certificates G Huston, G Michaelson, R Loomans | 78 | 2012 |
BGP wedgies T Griffin, G Huston | 77 | 2005 |
IPv6 address prefix reserved for documentation G Huston, A Lord, P Smith | 74 | 2004 |
Validation of route origination using the resource certificate public key infrastructure (PKI) and route origin authorizations (ROAs) G Huston, G Michaelson | 72 | 2012 |