Return to Article Details Determination of components of route hijack risk by Internet connections topology analysis Download Download PDF