chore(bib): use howpublished with \url for urls
This commit is contained in:
parent
1180360c2b
commit
ef40e1da6b
@ -22,7 +22,7 @@
|
||||
title={NTPd devices},
|
||||
author={Shodan},
|
||||
publisher={Shodan},
|
||||
howpublished={https://www.shodan.io/search?query=ntpd},
|
||||
howpublished={\url{https://www.shodan.io/search?query=ntpd}},
|
||||
year=2021,
|
||||
month=mar,
|
||||
note={[online] Accessed: 2021-03-06},
|
||||
@ -30,126 +30,126 @@
|
||||
|
||||
@inproceedings{rfc4271bgp4,
|
||||
number="{Technical report 4271}",
|
||||
howpublished={RFC 4271},
|
||||
institution={Internet Engineering Task Force},
|
||||
publisher={Internet Engineering Task Force},
|
||||
doi={10.17487/RFC4271},
|
||||
url={https://datatracker.ietf.org/doc/html/rfc4271},
|
||||
howpublished={\url{https://datatracker.ietf.org/doc/html/rfc4271}},
|
||||
author={Yakov Rekhter and Susan Hares and Tony Li},
|
||||
title={{A Border Gateway Protocol 4 (BGP-4)}},
|
||||
pagetotal=104,
|
||||
pages=4,
|
||||
year=2006,
|
||||
month=jan,
|
||||
note="{Also available as \url{https://datatracker.ietf.org/doc/html/rfc4271}}"
|
||||
}
|
||||
|
||||
@techreport{rfc3704multihomed,
|
||||
series={Request for Comments},
|
||||
number=3704,
|
||||
howpublished={RFC 3704},
|
||||
institution={Internet Engineering Task Force},
|
||||
publisher={Internet Engineering Task Force},
|
||||
doi={10.17487/RFC3704},
|
||||
url={https://datatracker.ietf.org/doc/html/rfc4271},
|
||||
howpublished={\url{https://datatracker.ietf.org/doc/html/rfc4271}},
|
||||
author={Fred Baker and Pekka Savola},
|
||||
title={{Ingress Filtering for Multihomed Networks}},
|
||||
pagetotal=16,
|
||||
year=2004,
|
||||
month=mar,
|
||||
note="{Also available as \url{https://datatracker.ietf.org/doc/html/rfc4271}}"
|
||||
}
|
||||
|
||||
@techreport{rfc793tcp,
|
||||
series={Request for Comments},
|
||||
number=793,
|
||||
howpublished={RFC 793},
|
||||
institution={Internet Engineering Task Force},
|
||||
publisher={Internet Engineering Task Force},
|
||||
doi={10.17487/RFC0793},
|
||||
url={https://datatracker.ietf.org/doc/html/rfc793},
|
||||
howpublished={\url{https://datatracker.ietf.org/doc/html/rfc793}},
|
||||
author={},
|
||||
title={{Transmission Control Protocol}},
|
||||
pagetotal=91,
|
||||
year=1981,
|
||||
month=sep,
|
||||
note="{Also available as \url{https://datatracker.ietf.org/doc/html/rfc793}}"
|
||||
}
|
||||
|
||||
@techreport{rfc1918,
|
||||
series={Request for Comments},
|
||||
number=1918,
|
||||
howpublished={RFC 1918},
|
||||
institution={Internet Engineering Task Force},
|
||||
publisher={Internet Engineering Task Force},
|
||||
doi={10.17487/RFC1918},
|
||||
url={https://datatracker.ietf.org/doc/html/rfc1918},
|
||||
howpublished={\url{https://datatracker.ietf.org/doc/html/rfc1918}},
|
||||
author={Robert Moskowitz and Daniel Karrenberg and Yakov Rekhter and Eliot Lear and Geert Jan de Groot},
|
||||
title={{Address Allocation for Private Internets}},
|
||||
pagetotal=9,
|
||||
year=1996,
|
||||
month=feb,
|
||||
note="{Also available as \url{https://datatracker.ietf.org/doc/html/rfc1918}}"
|
||||
}
|
||||
|
||||
@techreport{rfc3882,
|
||||
series={Request for Comments},
|
||||
number=3882,
|
||||
howpublished={RFC 3882},
|
||||
institution={Internet Engineering Task Force},
|
||||
publisher={Internet Engineering Task Force},
|
||||
doi={10.17487/RFC3882},
|
||||
url={https://datatracker.ietf.org/doc/html/rfc3882},
|
||||
howpublished={\url{https://datatracker.ietf.org/doc/html/rfc3882}},
|
||||
author={Doughan Turk},
|
||||
title={{Configuring BGP to Block Denial-of-Service Attacks}},
|
||||
pagetotal=8,
|
||||
year=2004,
|
||||
month=oct,
|
||||
abstract={This document describes an operational technique that uses BGP communities to remotely trigger black-holing of a particular destination network to block denial-of-service attacks. Black-holing can be applied on a selection of routers rather than all BGP-speaking routers in the network. The document also describes a sinkhole tunnel technique using BGP communities and tunnels to pull traffic into a sinkhole router for analysis. This memo provides information for the Internet community.},
|
||||
note="{Also available as \url{https://datatracker.ietf.org/doc/html/rfc3882}}"
|
||||
}
|
||||
|
||||
@techreport{rfc5735,
|
||||
series={Request for Comments},
|
||||
number=5735,
|
||||
howpublished={RFC 5735},
|
||||
institution={Internet Engineering Task Force},
|
||||
publisher={Internet Engineering Task Force},
|
||||
doi={10.17487/RFC5735},
|
||||
url={https://datatracker.ietf.org/doc/html/rfc5735},
|
||||
howpublished={\url{https://datatracker.ietf.org/doc/html/rfc5735}},
|
||||
author={Michelle Cotton and Leo Vegoda},
|
||||
title={{Special Use IPv4 Addresses}},
|
||||
pagetotal=10,
|
||||
year=2010,
|
||||
month=jan,
|
||||
abstract={This document obsoletes RFC 3330. It describes the global and other specialized IPv4 address blocks that have been assigned by the Internet Assigned Numbers Authority (IANA). It does not address IPv4 address space assigned to operators and users through the Regional Internet Registries, nor does it address IPv4 address space assigned directly by IANA prior to the creation of the Regional Internet Registries. It also does not address allocations or assignments of IPv6 addresses or autonomous system numbers. This memo documents an Internet Best Current Practice.},
|
||||
note="{Also available as \url{https://datatracker.ietf.org/doc/html/rfc5735}}"
|
||||
}
|
||||
|
||||
@techreport{rfc6298,
|
||||
series={Request for Comments},
|
||||
number=6298,
|
||||
howpublished={RFC 6298},
|
||||
institution={Internet Engineering Task Force},
|
||||
publisher={Internet Engineering Task Force},
|
||||
doi={10.17487/RFC6298},
|
||||
url={https://datatracker.ietf.org/doc/html/rfc6298},
|
||||
howpublished={\url{https://datatracker.ietf.org/doc/html/rfc6298}},
|
||||
author={Matt Sargent and Jerry Chu and Dr. Vern Paxson and Mark Allman},
|
||||
title={{Computing TCP's Retransmission Timer}},
|
||||
pagetotal=11,
|
||||
year=2011,
|
||||
month="{June}",
|
||||
abstract={This document defines the standard algorithm that Transmission Control Protocol (TCP) senders are required to use to compute and manage their retransmission timer. It expands on the discussion in Section 4.2.3.1 of RFC 1122 and upgrades the requirement of supporting the algorithm from a SHOULD to a MUST. This document obsoletes RFC 2988. {[}STANDARDS-TRACK{]}},
|
||||
note="{Also available as \url{https://datatracker.ietf.org/doc/html/rfc6298}}"
|
||||
}
|
||||
|
||||
@techreport{rfc6598,
|
||||
series={Request for Comments},
|
||||
number=6598,
|
||||
howpublished={RFC 6598},
|
||||
institution={Internet Engineering Task Force},
|
||||
publisher={Internet Engineering Task Force},
|
||||
doi={10.17487/RFC6598},
|
||||
url={https://datatracker.ietf.org/doc/html/rfc6598},
|
||||
howpublished={\url{https://datatracker.ietf.org/doc/html/rfc6598}},
|
||||
author={Jason Weil and Victor Kuarsingh and Chris Donley and Christopher Liljenstolpe and Marla Azinger},
|
||||
title={{IANA-Reserved IPv4 Prefix for Shared Address Space}},
|
||||
pagetotal=11,
|
||||
year=2012,
|
||||
month=apr,
|
||||
abstract={This document obsoletes RFC 3330. It describes the global and other specialized IPv4 address blocks that have been assigned by the Internet Assigned Numbers Authority (IANA). It does not address IPv4 address space assigned to operators and users through the Regional Internet Registries, nor does it address IPv4 address space assigned directly by IANA prior to the creation of the Regional Internet Registries. It also does not address allocations or assignments of IPv6 addresses or autonomous system numbers. This memo documents an Internet Best Current Practice.},
|
||||
note="{Also available as \url{https://datatracker.ietf.org/doc/html/rfc6598}}"
|
||||
}
|
||||
|
||||
|
||||
@ -157,7 +157,7 @@
|
||||
title={Average prefix length},
|
||||
author={Geoff Huston},
|
||||
publisher={potaroo.net},
|
||||
url={https://bgp.potaroo.net/cgi-bin/plota?file=%2fvar%2fdata%2fbgp%2fas2%2e0%2fbgp%2daverage%2dprefix%2etxt&descr=Average%20prefix%20length&ylabel=Average%20prefix%20length&with=step},
|
||||
howpublished={\url{https://bgp.potaroo.net/cgi-bin/plota?file=%2fvar%2fdata%2fbgp%2fas2%2e0%2fbgp%2daverage%2dprefix%2etxt&descr=Average%20prefix%20length&ylabel=Average%20prefix%20length&with=step}},
|
||||
note={[online] Accessed: 2021-05-11},
|
||||
}
|
||||
|
||||
@ -165,7 +165,7 @@
|
||||
title={Average prefix size updated},
|
||||
author={Geoff Huston},
|
||||
publisher={potaroo.net},
|
||||
url={https://bgp.potaroo.net/cgi-bin/plota?file=%2fvar%2fdata%2fbgp%2fas2%2e0%2fbgp%2dupd%2davgprefsize%2etxt&descr=Average%20prefix%20size%20updated&ylabel=Average%20prefix%20size%20updated&with=step},
|
||||
howpublished={\url{https://bgp.potaroo.net/cgi-bin/plota?file=%2fvar%2fdata%2fbgp%2fas2%2e0%2fbgp%2dupd%2davgprefsize%2etxt&descr=Average%20prefix%20size%20updated&ylabel=Average%20prefix%20size%20updated&with=step}},
|
||||
note={[online] Accessed: 2021-05-11},
|
||||
}
|
||||
|
||||
@ -173,7 +173,7 @@
|
||||
title={The Bogon Reference},
|
||||
author="{Team Cymru}",
|
||||
publisher={Team Cymru},
|
||||
url={https://team-cymru.com/community-services/bogon-reference/},
|
||||
howpublished={\url{https://team-cymru.com/community-services/bogon-reference/}},
|
||||
note={[online] Accessed: 2021-05-02},
|
||||
}
|
||||
|
||||
@ -191,7 +191,7 @@
|
||||
title={Cisco Annual Internet Report (2018–2023) White Paper},
|
||||
author={Cisco},
|
||||
publisher={Cisco},
|
||||
url={https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.html},
|
||||
howpublished={\url{https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.html}},
|
||||
year=2020,
|
||||
month=mar,
|
||||
note={[online] Accessed: 2021-05-02},
|
||||
@ -203,7 +203,7 @@
|
||||
title={Memcached DDoS Attack},
|
||||
author={Cloudflare},
|
||||
publisher={Cloudflare},
|
||||
url={https://www.cloudflare.com/en-gb/learning/ddos/memcached-ddos-attack/},
|
||||
howpublished={\url{https://www.cloudflare.com/en-gb/learning/ddos/memcached-ddos-attack/}},
|
||||
note={[online] Accessed: 2021-05-03},
|
||||
}
|
||||
|
||||
@ -213,7 +213,7 @@
|
||||
title={DNS Amplification Attacks and Truncated Responses},
|
||||
author={Akamai},
|
||||
publisher={Akamai},
|
||||
url={https://blogs.akamai.com/2015/06/dns-amplification-attacks-and-truncated-responses.html},
|
||||
howpublished={\url{https://blogs.akamai.com/2015/06/dns-amplification-attacks-and-truncated-responses.html}},
|
||||
year=2015,
|
||||
month="{June}",
|
||||
note={[online] Accessed: 2021-04-03},
|
||||
@ -225,7 +225,7 @@
|
||||
title={2021: VOLUMETRIC DDOS ATTACKS RISING FAST},
|
||||
author={Tom Emmons},
|
||||
publisher={Akamai},
|
||||
url={https://blogs.akamai.com/2021/03/in-our-2020-ddos-retrospective},
|
||||
howpublished={\url{https://blogs.akamai.com/2021/03/in-our-2020-ddos-retrospective}},
|
||||
year=2021,
|
||||
month=mar,
|
||||
note={[online] Accessed: 2021-05-03},
|
||||
@ -236,7 +236,7 @@
|
||||
title={PART I: RETROSPECTIVE 2020: DDOS WAS BACK -- BIGGER AND BADDER THAN EVER BEFORE},
|
||||
author={Tom Emmons},
|
||||
publisher={Akamai},
|
||||
url={https://blogs.akamai.com/2021/01/part-i-retrospective-2020-ddos-was-back-bigger-and-badder-than-ever-before.html},
|
||||
howpublished={\url{https://blogs.akamai.com/2021/01/part-i-retrospective-2020-ddos-was-back-bigger-and-badder-than-ever-before.html}},
|
||||
year=2021,
|
||||
month=jan,
|
||||
note={[online] Accessed: 2021-05-03},
|
||||
@ -247,7 +247,7 @@
|
||||
title={DDoS Defense in a Hybrid Cloud World},
|
||||
author={Akamai},
|
||||
publisher={Akamai},
|
||||
url={https://www.akamai.com/us/en/multimedia/documents/ebooks/ddos-defense-in-a-hybrid-cloud-world.pdf},
|
||||
howpublished={\url{https://www.akamai.com/us/en/multimedia/documents/ebooks/ddos-defense-in-a-hybrid-cloud-world.pdf}},
|
||||
note={[online] Accessed: 2021-05-03},
|
||||
year=2021,
|
||||
}
|
||||
@ -255,7 +255,7 @@
|
||||
@misc{linuxretransmission,
|
||||
title={Linux Networking Documentation >> SNMP Counter},
|
||||
author="{The kernel development community}",
|
||||
howpublished={https://www.kernel.org/doc/html/latest/networking/snmp\_counter.html\#tcp-retransmission-and-congestion-control},
|
||||
howpublished={\url{https://www.kernel.org/doc/html/latest/networking/snmp\_counter.html\#tcp-retransmission-and-congestion-control}},
|
||||
note={[online] Accessed: 2021-05-10},
|
||||
}
|
||||
|
||||
@ -264,7 +264,7 @@
|
||||
author={rapid7},
|
||||
publisher={GitHub},
|
||||
journal={GitHub repository},
|
||||
howpublished={https://github.com/rapid7/metasploit-framework},
|
||||
howpublished={\url{https://github.com/rapid7/metasploit-framework}},
|
||||
year=2021,
|
||||
note={[online] Accessed: 2021-04-03},
|
||||
}
|
||||
@ -274,7 +274,7 @@
|
||||
author={Pavel Odintsov},
|
||||
publisher={GitHub},
|
||||
journal={GitHub repository},
|
||||
howpublished={https://github.com/pavel-odintsov/fastnetmon},
|
||||
howpublished={\url{https://github.com/pavel-odintsov/fastnetmon}},
|
||||
year=2021,
|
||||
note={[online] Accessed: 2021-04-13},
|
||||
}
|
||||
@ -284,7 +284,7 @@
|
||||
author={Pavel Odintsov},
|
||||
publisher={GitHub},
|
||||
journal={GitHub repository},
|
||||
howpublished={https://github.com/Wofbit/fastnetmon},
|
||||
howpublished={\url{https://github.com/Wofbit/fastnetmon}},
|
||||
year=2021,
|
||||
note={[online] Accessed: 2021-04-13},
|
||||
}
|
||||
@ -294,25 +294,25 @@
|
||||
author={P. Odintsov and A. Mirre},
|
||||
publisher={git.dotya.ml},
|
||||
journal={git repository},
|
||||
howpublished={https://git.dotya.ml/wanderer/fastnetmon-ng},
|
||||
howpublished={\url{https://git.dotya.ml/wanderer/fastnetmon-ng}},
|
||||
year=2021,
|
||||
note={[online] Accessed: 2021-05-04},
|
||||
}
|
||||
|
||||
|
||||
@inproceedings{Boye2012NetfilterCT,
|
||||
@misc{Boye2012NetfilterCT,
|
||||
title={Netfilter Connection Tracking and NAT Implementation},
|
||||
author={Magnus Boye},
|
||||
year=2012,
|
||||
url={https://wiki.aalto.fi/download/attachments/69901948/netfilter-paper.pdf},
|
||||
howpublished={\url{https://wiki.aalto.fi/download/attachments/69901948/netfilter-paper.pdf}},
|
||||
note={[online] Accessed: 2021-05-05},
|
||||
}
|
||||
|
||||
@inproceedings{Westphal2017CT,
|
||||
@misc{Westphal2017CT,
|
||||
title={improvements to conntrack table overflow handling},
|
||||
booktitle={Netdev 2.1, The Technical Conference on Linux Networking},
|
||||
author={Florian Westphal},
|
||||
url={https://netdevconf.info/2.1/papers/conntrack.pdf},
|
||||
howpublished={\url{https://netdevconf.info/2.1/papers/conntrack.pdf}},
|
||||
pages=2,
|
||||
year=2017,
|
||||
month=apr,
|
||||
@ -325,7 +325,7 @@
|
||||
school={Université catholique de Louvain},
|
||||
year=2006,
|
||||
month=aug,
|
||||
url={http://inl.info.ucl.ac.be/system/files/Quoitin-PhD.pdf},
|
||||
howpublished={\url{http://inl.info.ucl.ac.be/system/files/Quoitin-PhD.pdf}},
|
||||
note={[online] Accessed: 2021-05-02},
|
||||
}
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user