参考文献

インターネットのカタチ もろさが織り成す粘り強い世界」の参考文献一覧です。
[1] John C. Doyle, David L. Alderson, Lun Li, Steven Low, Matthew Roughan, Stanislav Shalunov, Reiko Tanaka, and Walter Willinger. "The ‘robust yet fragile’ nature of the Internet". Proceedings of the National Academy of Sciences of the United States of America, Vol. 102, No. 41, October 2005 (http://www.pnas.org/content/102/41/14497.abstract).
[2] "Centers for Disease Control and Prevention". as of 2010 (http://www.cdc.gov/).
[3] "OECD Factblog: Internet penetration - who’s online?". February 2010 (https://community.oecd.org/community/factblog/blog/2010/02/12/internet-penetration--who-s-online).
[4] J.Postel. "INTERNET CONTROL MESSAGE PROTOCOL". September 1981 (http://tools.ietf.org/html/rfc792).
[5] "2008 ITIF Broadband Rankings". The Information Technology & Innovation Foundation, March 2008 (http://www.itif.org/files/2008BBRankings.pdf).
[6] "Internet Speeds and Costs Around the World, Shown Visually". GIZMODO, January 2010 (http://gizmodo.com/5390014/internet-speedsand-costs-around-the-world-shown-visually).
[7] David D. Clark. "The Design Philosophy of the DARPA Internet Protocols". Proceedings of ACM SIGCOMM, Vol. 18, No. 4, pp. 106-114, August 1988(http://ccr.sigcomm.org/archive/1995/jan95/ccr-9501-clark.pdf).
[8] J.McQuillan and D.Walden. "The ARPA Network Design Decisions". Computer Networks, Vol. 1, No. 5, pp. 243-289, August 1977.
[9] R.E.Kahn, S.A.Gronemeyer, J.Burdifiel, and E.V.Hoversten. "Advances in Packet Radio Technology". Proceedings of the IEEE, Vol. 66, No. 11, pp.140- 1496, November 1978.
[10] B.M.Leiner, D.L.Nelson, and F.A.Tobagi. "Issues in Packet Radio Design". Proceedings of the IEEE, Vol. 75, No. 1, pp. 6-20, January 1987.
[11] Barry M.Leiner, Vinton G.Cerf, David D. Clark, Robert E.Khan, Leonard Kleinrock, Daniel C.Lynch, Jon Postel, Larry G.Roberts, and Stephen Wolff. "A brief history of the Internet". ACM SIGCOMM Computer Communication Review, Vol. 39, No. 5, pp. 22-31, October 2009 (原文はhttp://www.isoc. org/internet/history/brief.shtml であるため、故Jon Postel氏がauthor として含まれています).
[12] "All About The Internet: History of the Internet". Internet Society(ISOC), as of 2011 (http://www.isoc.org/internet/history/brief.shtml).
[13] "NSF and the Birth of the Internet - Special Report". National Science Foundation, as of 2011 (http://www.nsf.gov/news/special_reports/nsf-net/1960s.jsp).
[14] 脇英世. 『インターネットを創った人たち』. 青土社, 2003.
[15] William Aspray. "Oral history interview with Jack P. Ruina". University of Minnesota: Charles Babbage Institute Collections, April 1989(http://special.lib.umn.edu/cbi/oh/display.phtml?sub=562).
[16] Arthur L. Norberg. "Oral history interview with Robert S. Cooper". University of Minnesota: Charles Babbage Institute Collections, September 1993 (http://special.lib.umn.edu/cbi/oh/display.phtml?sub=659).
[17] 喜多千草. 『インターネットの思想史』. 青土社, 2003.
[18] Leonard Kleinrock. "Information Flow in Large Communication Nets". RLE Quarterly Progress Report, July 1961.
[19] Leonard Kleinrock. "Communication Nets: Stochastic Message Flow and Delay". Mcgraw-Hill(New York), 1964.
[20] J.Moy. "OSPF Version 2". April 1998 (http://tools.ietf.org/html/rfc2328).
[21] "Internet Assigned Numbers Authority" (http://www.iana.org/).
[22] "Pakistan lifts the ban on YouTube". BBC, February 2008 (http://news.bbc.co.uk/2/hi/technology/7262071.stm).
[23] "YouTube Hijacking: A RIPE NCC RIS case study". RIPE-NCC, February 2008(http://www.ripe.net/news/study-youtube-hijacking.html).
[24] Lorenzo Colitti, Giuseppe Di Battista, Federico Mariani, Maurizio Patrignani, and Maurizio Pizzonia. "Visualizing Interdomain Routing with BGPlay". Journal of Graph Algorithms and Applications, pp. 117-148, 2005.
[25] S.Murphy. "BGP Security Vulnerabilities Analysis". January 2006 (http://tools.ietf.org/html/rfc4272).
[26] "Secure BGP". January 2004 (http://www.net-tech.bbn.com/sbgp/).
[27] "Secure Origin BGP". Cisco The Internet Protocol Journal, Vol. 6, No. 3, September 2003 (http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_6-3/securing_bgp_sobgp.html).
[28] "RADB". as of 2011 (http://www.radb.net/).
[29]『社団法人日本ネットワークインフォメーションセンター』. as of 2011 (http://www.nic.ad.jp/).
[30] "JPIRR". as of 2011 (http://www.nic.ad.jp/ja/irr/).
[31] "Telecom-ISAC Japan". as of 2010 (http://www.telecom-isac.jp/).
[32] 渡辺英一郎. 『経路奉行の取り組み』. Internet Week 2009, November 2009 (http://www.nic.ad.jp/ja/materials/iw/2009/proceedings/h10/iw2009-h10-02.pdf).
[33]『[BGP 経路ハイジャック]誤った経路に導く,難しい根本対策の徹底』. ITpro, March 2009 (http://itpro.nikkeibp.co.jp/article/COLUMN/20090225/325481/).
[34] "Reckless Driving on the Internet". Renesys Blog, February 2009(http://www.renesys.com/blog/2009/02/the-flap-heard-around-the-worl.shtml).
[35] "JApan Network Operators’ Group" (http://www.janog.gr.jp/).
[36] "North American Network Operators’ Group" (http://www.nanog.org/).
[37]『中国ISP がインターネットの約10 %をハイジャックか?』. Geek なぺーじ, April 2010 (http://www.geekpage.jp/blog/?id=2010/4/10/1).
[38] "Official Google Blog : Google Apps is out of beta (yes, really)". Official Google Blog, July 2009(http://googleblog.blogspot.com/2009/07/google-appsis-out-of-beta-yes-really.html).
[39] "The Internet Engineering Task Force". as of 2010 (http://www.ietf.org/).
[40] "I-D Action:draft-scudder-idr-optional-transitive-00.txt". IETF i-d-announce mailing list archive, March 2009(http://www.ietf.org/mail-archive/web/i-d-announce/current/msg24148.html).
[41] "Error Handling for Optional Transitive BGP Attributes draft-ietf-idroptional-transitive-03". IETF datatracker.ietf.org, December 2010 (http://datatracker.ietf.org/doc/draft-ietf-idr-optional-transitive/).
[42] "ITU - International Telecommunication Union". as of 2010(http://www.itu.int/).
[43] "ISO - International Organization for Standardization". as of 2010 (http://www.iso.org/).
[44] D.Waitzman. "A Standard for the Transmission of IP Datagrams on Avian Carriers". April 1990 (http://tools.ietf.org/html/rfc1149).
[45] 川村聖一. 『Views vol.780【臨時号】IPv6 アドレスの推奨表記、RFC5952 ができるまでの道のり
[後編] 一つのRFC ができるまで』. JPNIC News, September 2010 (http://www.nic.ad.jp/ja/mailmagazine/backnumber/2010/vol780.html).
[46] S.Bradner. "IETF Working Group Guidelines and Procedures". September 1998(http://tools.ietf.org/html/rfc2418).
[47] David D. Clark. "A Cloudy Crystal Ball - Visions of the Future". Proceedings of the Twenty-Fourth Internet Engineering Task Force, pp. 539-543, July 1992(http://ietf.org/proceedings/prior29/IETF24.pdf).
[48] "The IESG" (http://www.ietf.org/iesg/).
[49] "Internet Architecture Board" (http://www.iab.org/).
[50] "The Tao of IETF: A Novice’s Guide to the Internet Engineering Task Force". November 2009 (http://www.ietf.org/tao.html).
[51] B.Carpenter. "Architectural Principles of the Internet". June 1996 (http://tools.ietf.org/html/rfc1958).
[52] "Why There Are No GIF files on GNU Web Pages". as of 2010 (http://www.w3c.org/TR/PNG/).
[53] "Portable Network Graphics (PNG) Specification". as of 2010 (http://www.w3c.org/TR/PNG/).
[54] "Intellectual Property Rights (IPR)". IETF, December as of 2010(http://www.ietf.org/ipr/).
[55] S.Bradner and J.Contreras. "Rights Contributors Provide to the IETF Trust". November 2008 (http://tools.ietf.org/html/rfc5378).
[56] V.See. "A Template for IETF Patent Disclosures and Licensing Declarations". September 2004 (http://tools.ietf.org/html/rfc3905).
[57] "HUAWEI TECHNOLOGIES CO.,LTD’s statement about IPR claimed in draftietf-syslog-transport-tls-02.txt". IETF IPR Details, June 2006 (https://datatracker.ietf.org/ipr/724/).
[58]『IETF のsyslog 標準化を脅かす特許出願』. SourceForge.JP Magazine, July 2006(http://sourceforge.jp/magazine/06/07/03/0221219).
[59]『中国企業がsyslog 関連特許を申請』. スラッシュドット・ジャパン, July 2006(http://slashdot.jp/yro/article.pl?sid=06/07/03/0316225).
[60] "[Syslog] Draft-ietf-syslog-transport-tls-01.txt". Syslog Mailing List, June 2006 (http://www.mail-archive.com/syslog@lists.ietf.org/msg00593.html).
[61] "[Syslog] Need your input on the Hauwei IPR claim". Syslog Mailing List, July 2006 (http://www.mail-archive.com/syslog@lists.ietf.org/msg00701.html).
[62] F.Miao, Y.Ma, and J.Salowey. "Transport Layer Security (TLS) Transport Mapping for Syslog". March 2009 (http://tools.ietf.org/html/rfc5425).
[63]『IETF:「どちらにも肩入れしない」-Sender ID とSPF 両技術の実験的RFCを公開』. CNET Japan, June 2005 (http://japan.cnet.com/news/media/story/0,2000056023,20084883,00.htm).
[64] "MARID to close". IETF Mailing List, September 2004 (http://www.imc.org/ietf-mxcomp/mail-archive/msg05054.html).
[65] J.Lyon and M.Wong. "Sender ID: Authenticating E-Mail". April 2006 (http://tools.ietf.org/html/rfc4406).
[66] E.Allman and H.Katz. "SMTP Service Extension for Indicating the Responsible Submitter of an E-Mail Message". April 2006(http://tools.ietf.org/html/rfc4405).
[67] J.Lyon. "Purported Responsible Address in E-Mail Messages". April 2006(http://tools.ietf.org/html/rfc4407).
[68] M.Wong andW.Schlitt. "Sender Policy Framework (SPF) for Authorizing Use of Domains in E-Mail, Version 1". April 2006 (http://tools.ietf.org/html/rfc4408).
[69] RFC Editor, et al. "30 Years of RFCs". April 1999 (http://tools.ietf.org/html/rfc2555).
[70] "What went wrong at the .de-registry earlier today?". Royal Pingdom, October 2009 (http://royal.pingdom.com/2009/10/13/sweden%E2%80%99sinternet-broken-by-dns-mistake/).
[71] "What went wrong at the .de-registry earlier today?". TLD.sc, May 2010 (http://www.tld.sc/en/2010/05/what-went-wrong-at-the-deregistry-earlier-today/).
[72] D.Eastlake and A.Panitz. "Reserved Top Level DNS Names". June 1999(http://tools.ietf.org/html/rfc2606).
[73] "Symantec to Acquire VeriSign’s Security Business Solidifying its Position as the World’s Most Trusted Source for Protecting Information and Identities Online". Symantec, August 2010 (http://www.symantec.com/about/news/release/article.jsp?prid=20100519_01).
[74] "Notice Regarding Symantec Acquisition of Verisign’s Authentication Businesses". Verisign, August 2010 (http://www.verisigninc.com/en_US/repository/acquisition-notice/index.xhtml).
[75] "A Survey of DNS Security: Most Vulnerable and Valuable Assets". Beehive/CoDoNS DNS Survey, July 2004(http://www.cs.cornell.edu/people/egs/beehive/dnssurvey.html).
[76] "Hushmail DNS Attack Blamed on Network Solutions". eWeek.com, April 2005(http://www.eweek.com/c/a/Security/Hushmail-DNS-Attack-Blamed-on-Network-Solutions/).
[77] "Twitter was not hacked - its DNS was hijacked (Update 2)". The Tech Herald, December 2009(http://www.thetechherald.com/article.php/200951/4978/Twitter-was-not-hacked-their-DNS-was-hijacked-Update).
[78]『ルートサーバに一斉DoS 攻撃』. ITmedia, October 2002 (http://www.itmedia.co.jp/news/0210/23/njbt_01.html).
[79] "Anycast And Communication Foiled February’s Root Server Attack". InformationWeek, March 2007(http://www.informationweek.com/news/internet/showArticle.jhtml?articleID=198000575).
[80] "Factsheet : Root server attack on 6 February 2007". ICANN, March 2007(http://www.icann.org/announcements/factsheet-dns-attack-08mar07.pdf).
[81] T.Hardie. "Distributing Authoritative Name Servers via Shared Unicast Addresses". April 2002 (http://tools.ietf.org/html/rfc3258).
[82] J.Abley and K.Lindqvist. "Operation of Anycast Services". December 2006(http://tools.ietf.org/html/rfc4786).
[83] "WIDE Project". as of 2010 (http://www.wide.ad.jp/).
[84] "M Root DNS Server". as of 2010 (http://m.root-servers.org/).
[85] "Dan Kaminsky’s DNS Discovery: The Massive, Multi-Vendor Issue and the Massive, Multi-Vendor Fix". Black Hat, July 2008 (http://www.blackhat.com/html/webinars/kaminsky-DNS.html).
[86]『(緊急) 複数のDNS ソフトウェアにおけるキャッシュポイズニングの脆弱性について(続報)』. JPRS, July 2008 (http://jprs.jp/tech/security/multipledns-vuln-cache-poisoning-update.html).
[87]『1 通の論文から始まったDNSSEC の歴史、ランチセミナーで紹介』. Impress INTERNET Watch, November 2009 (http://internet.watch.impress.co.jp/docs/event/iw2009/20091127_331941.html).
[88] "Root DNSSEC". as of 2010 (http://www.root-dnssec.org/).
[89] "SERVFAILS IN .NET AFTER PUBLICATION OF DS RECORD". VeriSign Labs, February 2011(http://www.verisignlabs.com/documents/BIND-DSServfail.pdf).
[90] "Study and action plan following the incident with validating resolvers on 12 February 2011". AFNIC, February 2011 (http://operations.afnic.fr/en/2011/02/18/study-and-action-plan-following-the-incident-withvalidating-resolvers-on-12-february-2011.html).
[91] "DNSSEC outage in ripe.net and 0.a.2.ip6.arpa". dns-operations, April 2011(https://lists.dns-oarc.net/pipermail/dns-operations/2011-April/007206.html).
[92] "Comcast DNSSEC resolver testbed: many failures". dns-operations, December 2009 (https://lists.dns-oarc.net/pipermail/dns-operations/2009-December/004815.html).
[93]『.UK DNSSEC 鍵の更新失敗』. Geek なぺーじ, September 2010 (http://www.geekpage.jp/blog/?id=2010/9/13/1).
[94]『計画停電にともなう誤動作が原因NICT のNTP サーバで1 月23 日に障害、誤った時刻を配信』. @ IT, January 2011(http://www.atmarkit.co.jp/news/201101/28/ntp.html).
[95] "New Top Level Domains". ICANN, as of 2011(http://icann.org/en/tlds/select.htm).
[96] "New gTLD Program - Applicant Guidebook". ICANN, as of 2011 (http://www.icann.org/en/topics/new-gtlds/dag-en.htm).
[97] "GMO Registry to Partner with Canon to Apply for ".canon" Domain". GMO Registry, May 2010 (http://www.gmo-registry.com/en/gmonews/detail.html?n=2010051000).
[98] "Hitachi to Partner with GMO Registry to Apply for and Operate ".hitachi" Domain". GMO Registry, March 2011 (http://www.gmo-registry.com/en/gmonews/detail.html?n=2011030200).
[99] "[xxx-tld-agreement] Chronological Index". ICANN Email Archives, as of 2011(http://forum.icann.org/lists/xxx-tld-agreement/).
[100] "[xxx-icm-agreement] Chronological Index". ICANN Email Archives, as of 2011(http://forum.icann.org/lists/xxx-icm-agreement/).
[101] "Comments Sent to Dr Twomey by Members of AFA". ICANN, as of 2011(http://forum.icann.org/cgi/dsp).
[102] "[xxx-comments] Chronological Index". ICANN Email Archives, as of 2011(http://forum.icann.org/lists/xxx-comments/).
[103]『米ブッシュ政権、「.xxx」ドメインに待った-ICANN、微妙な立場に』. CNET Japan, August 2005 (http://japan.cnet.com/news/media/20086418/).
[104]『ICM Registry、ポルノ用ドメイン「.xxx」承認に再挑戦』. CNET Japan, May 2006 (http://japan.cnet.com/news/media/20118227/).
[105] "ICANN CEO Talks About the New Affirmation of Commitments". ICANN, September 2009 (http://www.icann.org/en/announcements/announcement-30sep09-en.htm).
[106] "Adults-only .xxx web addresses go online". Telograph, April 2011(http://www.telegraph.co.uk/technology/internet/8459390/Adultsonly-.xxx-web-addresses-go-online.html).
[107] "First IDN ccTLDs Available". ICANN, May 2010 (http://www.icann.org/en/announcements/announcement-05may10-en.htm).
[108] "CEO Commends Russia for Bringing Cyrillic to Internet’s Top-level Domain Names". ICANN, May 2010 (http://www.icann.org/en/news/releases/release-13may10-en.pdf).
[109] "Chinese language top-level domains win ICANN approval". ComputerWorld, June 2010(http://www.computerworld.com/s/article/9178525/Chinese_language_top_level_domains_win_ICANN_approval).
[110] P.Faltstrom, P.Hoffman, and A.Costello. "Internationalizing Domain Names in Applications (IDNA)". March 2003 (http://tools.ietf.org/html/rfc3490).
[111] P.Hoffman and M.Blanchet. "Nameprep: A Stringprep Profile for Internationalized Domain Names (IDN)". March 2003 (http://tools.ietf.org/html/rfc3491).
[112] A.Costello. "Punycode: A Bootstring encoding of Unicode for Internationalized Domain Names in Applications (IDNA)". March 2003 (http://tools.ietf.org/html/rfc3492).
[113] J.Klensin. "Internationalized Domain Names for Applications (IDNA): Definitions and Document Framework". August 2010 (http://tools.ietf.org/html/rfc5890).
[114] J.Klensin. "Internationalized Domain Names in Applications (IDNA): Protocol". August 2010 (http://tools.ietf.org/html/rfc5891).
[115]『JPRS が「. 日本」管理運営事業者の候補事業者として選定』. JPRS, October 2010 (http://jprs.co.jp/topics/2010/101012.html).
[116] "My Name, My Language, My Internet: IDN Test Goes Live". ICANN, October 2007 (http://www.icann.org/en/announcements/announcement-15oct07.htm).
[117] G.Huston, A.Lord, and P.Smith. "IPv6 Address Prefix Reserved for Documentation". July 2004 (http://tools.ietf.org/html/rfc3849).
[118] M.Blanchet. "Special-Use IPv6 Addresses". April 2008 (http://tools.ietf.org/html/rfc5156).
[119] G.Huston. "Autonomous System (AS) Number Reservation for Documentation Use". December 2008 (http://tools.ietf.org/html/rfc5398).
[120] M.Cotton and L.Vegoda. "Special Use IPv4 Addresses". January 2010 (http://tools.ietf.org/html/rfc5735).
[121] "ICANN". as of 2011 (http://www.icann.org/).
[122] Internet Architecture Board. "IAB Technical Comment on the Unique DNS Root". May 2000 (http://tools.ietf.org/html/rfc2826).
[123] "Report of the Internationalized Domain Names Internal Working Group of the ICANN Board of Directors - 28 August 2001". ICANN, August 2001 (http://www.icann.org/en/committees/idn/final-report-28aug01.htm).
[124]『「. 日本」なんてイラネ、と言う前に知っておくべき話』. JANOG 26 Meeting, July 2010 (http://www.janog.gr.jp/meeting/janog26/program/idn.html).
[125] "Network Solutions Company History". as of 2010 (http://aboutnetworksolutions.com/corporate-history.php).
[126] "VeriSign buys Network Solutions in $21 billion deal". CNET News, March 2000(http://news.cnet.com/2100-1023-237656.html).
[127] "Cogent Completes PSINet Acquisition". Internetnews.com, April 2002(http://www.internetnews.com/bus-news/article.php/1002851/Cogent-Completes-PSINet-Acquisition.htm).
[128] "DNS Root Name Servers Frequently Asked Questions". ISOC, February 2008(http://www.isoc.org/briefings/020/).
[129] 光海底ケーブル執筆委員会. 『光海底ケーブル』. 株式会社パレード, 2010.
[130] "Taiwan earthquake triggers a "digital tsunami" in Asia". World Socialist Web Site, January 2007 (http://www.wsws.org/articles/2007/jan2007/taiwj09.shtml).
[131] "Asia communications hit by quake". BBC NEWS, December 2006 (http://news.bbc.co.uk/2/hi/asia-pacific/6211451.stm).
[132] "Earthquake disrupts Internet access in Asia". ComputerWorld, December 2006 (http://www.computerworld.com/s/article/9006819/Earthquake_disrupts_Internet_access_in_Asia).
[133] "Taiwan Earthquake Fiber Cuts: a Service Provider View". NANOG 39 Meeting, February 2007(http://www.nanog.org/meetings/nanog39/abstracts.php?pt=MjUxJm5hbm9nMzk=&nm=nanog39).
[134] "NTT Communications Global Connectivity". NTT Com 企業情報, 2006(http://www.ntt.com/taiwan/img/network.pdf).
[135] "Earthquake in Asia, Spam Plummets". CircleID, December 2006 (http://www.circleid.com/posts/earthquake_in_asia_spam_plummets/).
[136]『NTT Com、台湾沖地震による通信障害がすべて回復したと発表』. Internet Watch, January 2007 (http://internet.watch.impress.co.jp/cda/news/2007/01/17/14489.html).
[137]『海底ケーブル、構築と運用の深イイ話』. JANOG26 Meeting, July 2010(http://www.janog.gr.jp/meeting/janog26/program/cable.html).
[138]『台湾沖地震に伴う海底ケーブルの復旧について(お知らせ)』. NTT Com 企業情報, June 2006 (http://www.ntt.com/taiwan/).
[139]『台湾沖地震に伴う故障の回復経緯について(お知らせ)』. NTT Com 企業情報, February 2006 (http://www.ntt.com/taiwan/0209.html).
[140] Antony Antony, Luca Cittadini, Daniel Karrenberg, Robert Kisteleki, Tiziana Refice, Tom Vest, and Rene Wilhelm. "Mediterranean Fiber Cable Cut (January-February 2008) Analysis of Network Dynamics". Tech. Report RT-DIA-124-2008, Dept. of Computer Science and Automation, University of Roma Tre, 2008.
[141] "Severed cable disrupt internet". BBC News, February 2008 (http://news.bbc.co.uk/2/hi/technology/7218008.stm).
[142] "Indian outsourcing sector hit by Internet disruption". AFP, January 2008 (http://afp.google.com/article/ALeqM5gadarOY4frbM-XSyXS0_wMfxpHig).
[143] "UN Official Feeds Cable Cut Sabotage Speculation". Wired.com, February 2008(http://www.wired.com/threatlevel/2008/02/un-official-fee/).
[144]『エジプト沖の海底ケーブル損傷、原因めぐり深まる謎』. AFPBB News, February 2008 (http://www.afpbb.com/article/disaster-accidents-crime/disaster/2348027/2613878).
[145]『「中東で海底ケーブル切断が連発」の背景』. WIRED VISION, February 2008(http://wiredvision.jp/news/200802/2008020722.html).
[146] "Fifth Cable Cut To Middle East". Slashdot, February 2008 (http://it.slashdot.org/it/08/02/06/1431206.shtml).
[147] "Cable Cut Fever Grips the Web". Wired.com, February 2008 (http://www.wired.com/threatlevel/2008/02/who-cut-the-cab/).
[148] "4th Undersea Cable Break: Between Qatar and UAE". mathaba, February 2008(http://mathaba.net/news/?x=580660).
[149] "Five Ton Anchor Caused Cable Cut". Wired.com, February 2008(http://www.wired.com/threatlevel/2008/02/five-ton-anchor/).
[150] "Ships Impounded in Middle East Cable Cuts". Data Center Knowledge, April 2008 (http://www.datacenterknowledge.com/archives/2008/04/13/ships-impounded-in-middle-east-cable-cuts/).
[151] "Remember The Undersea Cables That Were Being Cut ? - Iraqi Ship Held, 2 Arrested". Homeland Security News, April 2008 (http://www.nationalterroralert.com/2008/04/12/remember-the-underseacables-that-were-being-cut/).
[152] "Sea-Me-We4". as of 2010 (http://www.seamewe4.com/).
[153] "Sea-Me-We3". as of 2010 (http://www.smw3.com/).
[154] "Realiance Globalcom". as of 2010 (http://www.flagtelecom.com/).
[155] "GO submarine cable fault part of wider disruption between Italy and Egypt". Times of Malta, December 2008 (http://www.timesofmalta.com/articles/view/20081219/local/go-submarine-cable-fault-part-of-widernumber- between-italy-and-egypt).
[156]『地中海でまたも海底ケーブル切断---中東・アジア14 ヵ国に影響』. WIRED VISION, December 2008(http://wiredvision.jp/news/200812/2008122222.html).
[157] "Severed cable disrupts net access". BBC News, December 2008(http://news.bbc.co.uk/2/hi/technology/7792688.stm).
[158] "Three undersea cables cut: traffic disturbed between Europe and Asia". fibresystems.org, December 2008 (http://fibresystems.org/cws/article/newsfeed/37128).
[159]『地中海の海底ケーブル切断の影響、80 %回復エジプト当局発表』. INTERNETWatch, December 2008(http://internet.watch.impress.co.jp/cda/news/2008/12/24/21951.html).
[160] "Severed Cables in Mediterranean Disrupt Communication (Update4)". Bloomberg, December 2008 (http://www.bloomberg.com/apps/news?pid=newsarchive&sid=ayPbWf_7l17w).
[161] "UDPATE 3-Undersea cable breaks cut Internet in Mideast, Asia". Reuters, December 2008 (http://www.reuters.com/article/idUSTRE4BJ0FV20081220).
[162] "Canal Characteristics". Suez Canal Authority, November 2010(http://www.suezcanal.gov.eg/sc.aspx?show=12).
[163]『KDDI やGoogle など出資の日米間海底ケーブル「Unity」が陸揚げ,2010年春に運用開始』. ITpro, November 2009 (http://itpro.nikkeibp.co.jp/article/NEWS/20091101/339898/).
[164]『日本と米国をつなぐ光海底ケーブル「Unity」が運用開始-グーグルやKDDIが参加』. CNET Japan, April 2010(http://japan.cnet.com/news/com/story/0,2000056021,20411454,00.htm).
[165] "Submarine Cable Map". TeleGeography, November 2010 (http://www.telegeography.com/telecom-resources/map-gallery/).
[166] "Kenyans await fibre-optic future". BBC News, November 2007(http://news.bbc.co.uk/2/hi/africa/7081214.stm).
[167] Sally Floyd and Kevin Fall. "Promoting the Use of End-to-End Congestion Control in the Internet". IEEE/ACM Transactions on Networking, Vol. 7, , August 1999 (http://www.icir.org/floyd/papers/collapse.may99.pdf).
[168] "East Africa gets high-speed web". BBC News, July 2009 (http://news.bbc.co.uk/2/hi/africa/8165077.stm).
[169] "Somali pirates delay South African fiber-optic cable". BusinessDay, May 2010(http://www.businessday.co.za/articles/Content.aspx?id=110448).
[170] "WIOCC EASSy". WIOCC, November 2010 (http://www.wiocc.net/).
[171] "Map Gallery". TeleGeography, as of 2011(http://www.telegeography.com/telecom-resources/map-gallery/).
[172]『世界中の通信トラフィックが米国経由:盗聴も自由に』. WIRED VISION, October 2007 (http://wiredvision.jp/news/200710/2007101523.html).
[173] "International Cable Protection Committee". as of 2010 (http://www.iscpc.org/).
[174] M.P. Wood and L. Carter. "Whale Entanglements With Submarine Telecommunication Cables". IEEE Journal of Oceanic Engineering, Vol. 33, No. 4, pp.445-450, October 2008(http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4769692).
[175] "FISHING AND SUBMARINE CABLES, WORKING TOGETHER, Second Edition". International Cable Protection Committee, February 2009(http://www.iscpc.org/information/Openly%20Published%20Members%20Area%20Items/ICPC_Fishing_Booklet_Rev_2.pdf).
[176] "Submarine Cable Network Security". Submarine Cable Protection Information Sharing Workshop, April 2009 (http://www.iscpc.org/information/Openly%20Published%20Members%20Area%20Items/Submarine_Cable_Network_Security.ppt).
[177] L.J. Marra. "Sharkbite on the SL submarine light wave cable system: History, cuses and resolution". IEEE Journal of Oceanic Engineering, Vol. 14, No. 3, pp.230-237, July 1989 (http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=29600).
[178] "Science: Abstracts Fiber-Optic Feeding Frenzy". TIME, June 1987 (http://www.time.com/time/magazine/article/0,9171,964701,00.html).
[179] "Did Shark bite the Fiber Optic Cable, linking Pakistan with world?". Pakistan Times, July 2005 (http://pakistantimes.net/2005/07/03/top2.htm).
[180] John C. Tanner. "2,000 METERS UNDER THE SEA : The telecom industry has gotten undersea cable deployment down to a science. So why are millions of surfers still stranded on the information superhighway at the whim of a fishing boat?". America’s Network, June 2001 (http://findarticles.com/p/articles/mi_m0DUJ/is_9_105/ai_n27568414/).
[181] "Vietnam’s submarine cable ‘lost’ and ‘found’". LIRNEasia, June 2007(http://lirneasia.net/2007/06/vietnams-submarine-cable-lost-and-found/).
[182]『インドネシアの3 島をリング状に接続する光海底ケーブルシステムが開通』. KDDI, May 1999 (http://www.kddi.com/corporate/news_release/kako/kdd/press99/99-030r.html).
[183] 田中浩, 岩田和之, 改田徹哉, 根井敏之, 泉田史. 『FTTH 時代における加害生物による光ファイバへの被害と既設光ファイバケーブルへの保護対策法』. Technical report of IEICE. OFT, Vol. 106, pp. 21-24, February 2007 (http://ci.nii.ac.jp/naid/110006250226/).
[184]『障害のお詫びとご報告』. SANNET, February 2009 (http://www.sannet.ne.jp/trouble/20090203.html).
[185]『ソフトバンク、徳島県の一部で通信障害発生』. ケータイWatch, January 2009(http://k-tai.impress.co.jp/cda/article/news_toppage/43638.html).
[186]『ケーブルを故意に切断、シリコンバレーで通信不通』. Wired Vision, April 2009(http://wiredvision.jp/news/200904/2009041021.html).
[187] "Sabotage attacks knock out phone service". San Francisco Chronicle, April 2009(http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2009/04/09/BAP816VTE6.DTL).
[188] "San Jose police: Sabotage caused phone outage in Santa Clara, Santa Cruz counties". San Hose Mercury News, April 2009 (http://www.mercurynews.com/ci_12106300 (ただしリンク切れ)).
[189] "Worse Is Better". NANOG49, June 2010(http://www.nanog.org/meetings/nanog49/abstracts.php?pt=MTU5NSZuYW5vZzQ5&nm=nanog49).
[190] "The Dalles, Oregon Data Center". Google, as of 2011 (http://www.google.com/datacenter/thedalles/).
[191] "US hunters shoot down Google fibre". iTnews.com.au, September 2010(http://www.itnews.com.au/News/232831,us-hunters-shoot-downgoogle-fibre.aspx).
[192] "Time Warner Asks for Help in Texas Copper Theft". betanews, August 2007 (http://www.betanews.com/article/Time-Warner-Asks-for-Help-in-Texas-Copper-Theft/1186422486).
[193] "Suspected copper thief severely burned on utility pole in Dallas". dallas news, August 2008 (http://www.dallasnews.com/sharedcontent/dws/news/localnews/stories/080208dnmetmanstuck.352a564.html).
[194]『グルジアなどでネット大規模障害、75歳女性が光ケーブルを切断』. AFP BB News, April 2011 (http://www.afpbb.com/article/disaster-accidentscrime/crime/2794806/7062880 (ただしリンク切れ)).
[195] "Georgian woman cuts off web access to whole of Armenia". The Guardian, April 2011(http://www.guardian.co.uk/world/2011/apr/06/georgian-womancuts-web-access).
[196]『元EEJUMP後藤被告、起訴事実認める 銅線窃盗』. asahi.com, December 2007 (http://www.asahi.com/special/070309/TKY200712190301.html).
[197]『後藤真希の弟・ユウキが逮捕、転売目的で100 万円相当の銅線窃盗。』. Narinari.com, October 2007(http://www.narinari.com/Nd/2007108114.html).
[198]『車両基地から銅線2300キロ盗難 神戸新交通が被害届』. MSN 産経ニュース, April 2010(http://sankei.jp.msn.com/affairs/crime/100406/crm1004061727018-n1.htm (ただしリンク切れ)).
[199]『元ホークス選手逮捕、原発3 0 キロ圏で電線盗容疑』. YOMIURI ONLINE, March 2011 (http://kyushu.yomiuri.co.jp/news/national/20110401-OYS1T00224.htm (ただしリンク切れ)).
[200]『原発3 0 キロ圏の電線窃盗… 元ソフトバンク選手を逮捕』. スポニチ, March 2011 (http://www.sponichi.co.jp/society/news/2011/03/31/kiji/K20110331000539860.html).
[201] "Japanese metal stolen to ’feed China’s Olympic boom’". The Guardian, March 2007 (http://www.guardian.co.uk/world/2007/mar/05/china.japan).
[202] "Deaths and disruption as price rise sees copper thefts soar". The Guardian, March 2008 (http://www.guardian.co.uk/world/2008/mar/20/internationalcrime).
[203] "NASA astronaut first to ’tweet’ from space". CNN.com, May 2009 (http://edition.cnn.com/2009/TECH/space/05/13/twitter.space/).
[204] "NASA Extends the World Wide Web Out Into Space". NASA, May 2009 (http://www.nasa.gov/home/hqnews/2010/jan/HQ_M10-011_Hawaii221169.html).
[205]『イリジウム衛星がロシアの通信衛星と衝突,30 日以内にスペア衛星を投入』. ITpro, February 2009(http://itpro.nikkeibp.co.jp/article/NEWS/20090212/324648/).
[206] "Russian and US satellites collide". BBC NEWS, February 2009(http://news.bbc.co.uk/2/hi/science/nature/7885051.stm).
[207] "BBC aims to gain from global iPlayer". The Telegraph, November 2010 (http://www.telegraph.co.uk/finance/newsbysector/mediatechnologyandtelecoms/digital-media/8114911/BBC-aims-togain-from-global-iPlayer.html).
[208]『YouTube API リファレンスガイド』. code.google.com, as of 2010 (http://code.google.com/intl/ja/apis/youtube/reference.html).
[209] "Akamai EdgeScape: Customize Web Content with Geointelligence". Akamai, as of 2010(http://www.akamai.com/html/technology/products/edgescape.html).
[210] "Tunisia: President Zine al-Abidine Ben Ali forced out". BBC News, January 2011 (http://www.bbc.co.uk/news/world-africa-12195025).
[211] "Egypt Cuts Off Most Internet and Cell Service". The New York Times, January 2011 (http://www.nytimes.com/2011/01/29/technology/internet/29cutoff.html).
[212] "Egypt Shuts Down Internet, Cellphone Services". The Wall Street Journal, January 2011 (http://online.wsj.com/article/SB10001424052748703956604576110453371369740.html).
[213] "Internet in Egypt offline". BGPmon.net Blog, January 2011 (http://bgpmon.net/blog/?p=450).
[214] "A Hole in the Internet". Renesys Blog, February 2011(http://www.renesys.com/blog/2011/02/egypt-a-hole-in-the-internet.shtml).
[215] "Libyan Disconnect". Renesys Blog, February 2011 (http://www.renesys.com/blog/2011/02/libyan-disconnect-1.shtml).
[216] "Libya Blocks Internet Traffic". International Business Times, February 2011(http://www.ibtimes.com/articles/118969/20110304/libya-cutsoff-internet-engages-kill-switch.htm).
[217] "How net providers stop child porn". BBC NEWS, February 2006 (http://news.bbc.co.uk/2/hi/technology/4689386.stm).
[218] J.Zittrain and B.Edelman. "Localized Google search result exclusions Statement of issues and call for data". Harvard Law School, October 2002(http://cyber.law.harvard.edu/filtering/google/).
[219] "World Day Against Cyber Censorship, Enemies of the Internet, Countries under surveillance". Reporters without borders, March 2010 (http://en.rsf.org/IMG/pdf/Internet_enemies.pdf).
[220] Richard Clayton, Steven J.Murdoch, and Robert N.M.Watson. "Ignoring the Great Firewall of China". Privacy Enhancing Technologies workshop (PET 2006), June 2006 (http://www.cl.cam.ac.uk/%7Ernc1/ignoring.pdf).
[221] "Keywords Used to Filter Web Content". The Washington Post, February 2006 (http://www.washingtonpost.com/wp-dyn/content/article/2006/02/18/AR2006021800554.html).
[222]『P2P ファイル共有からWeb サービスへシフト傾向にあるトラフィック』. IIJ Internet Infrastructure Review vol.8, August 2010 (http://www.iij.ad.jp/development/iir/pdf/iir_vol08_report.pdf).
[223] Graham Lowe, Patrick Winters, and Michael L. Marcus. "The Great DNS Wall of China". December 2007(http://cs.nyu.edu/%7Epcw216/work/nds/final.pdf).
[224] "Dynamic Internet Technology Inc. Alleges Skype Redirects Users in China to Censorware Version - Ten Days After Users Are Able To Download Freegate Software Through Skype". TMCnet.com, September 2007 (http://callcenterinfo.tmcnet.com/news/2007/09/24/2962449.htm).
[225] "Skype says texts are censored by China". FINANCIAL TIMES, April 2006(http://www.ft.com/cms/s/2/875630d4-cef9-11da-925d-0000779e2340.html).
[226] "Skype’s China spying sparks anger". REUTERS, October 2008 (http://www.reuters.com/article/idUSTRE49238X20081003).
[227] "Skype President Addresses Chinese Privacy Breach". Skype Blogs, October 2008(http://share.skype.com/sites/en/2008/10/skype_president_addresses_chin.html).
[228] "The Notification about further enhancement of auditing domain name registration information". China Internet Network Information Center, December 2009(http://www.cnnic.cn/html/Dir/2009/12/12/5750.htm).
[229] "China seeks identity ofWeb site operators". CNET News, February 2010(http://news.cnet.com/8301-27080_3-10458420-245.html).
[230] "China moves closer to a smut-free internet". The Register, December 2009(http://www.theregister.co.uk/2009/12/22/china_white_list/).
[231] "Report: China Halts Overseas Registrars from Registering .CN Domains". Domain Name Wire, January 2010 (http://domainnamewire.com/2010/01/05/report-china-halts-overseas-registrars-from-registering-cndomains/).
[232] "In response to new rules, GoDaddy to stop registering domain names in China". The Washington Post, March 2010 (http://www.washingtonpost.com/wpdyn/content/article/2010/03/24/AR2010032401543.html).
[233] "Google Warns of China Exit Over Hacking". The WALLSTREET JOURNAL, January 2010 (http://online.wsj.com/article/SB126333757451026659.html).
[234] "China’s .Cn Domain Name Loses 39% of Registrations in 4 Months". Domain Name Wire, May 2010 (http://domainnamewire.com/2010/05/13/chinascn-domain-name-loses-39-of-registrations-in-4-months/).
[235] "THE DOMAIN NAME INDUSTRY BRIEF". THE VERISIGN DOMAIN REPORT, February 2010 (http://www.verisigninc.com/assets/domainname-report-feb10.pdf).
[236] "THE DOMAIN NAME INDUSTRY BRIEF". THE VERISIGN DOMAIN REPORT, June 2010(http://www.verisigninc.com/assets/domain-namereport-june10.pdf).
[237] "[dns-operations] Odd behaviour on one node in I root-server (facebook, youtube & twitter)". dns-operations mailing list, March 2010(https://lists.dns-oarc.net/pipermail/dns-operations/2010-March/005260.html).
[238] "DNS: When Governments Lie (1)". Renesys Blog, November 2010 (http://www.renesys.com/blog/2010/11/dns-when-governments-lie-1.shtml).
[239] "2010 REPORT TO CONGRESS of the U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION". U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION, November 2010 (http://www.uscc.gov/annual_report/2010/annual_report_full_10.pdf).
[240] "China Hijacks 15% of Internet Traffic!". Arbor Networks, November 2010(http://asert.arbornetworks.com/2010/11/china-hijacks-15-ofinternet-traffic/).
[241]『児童ポルノブロッキングについての当協会の見解』. JAIPA, May 2010 (http://www.jaipa.or.jp/comment/100518_jipo.pdf).
[242]『「児童ポルノ掲載アドレスリスト作成管理団体運用ガイドライン案」に対する意見の募集結果について』. インターネット協会, March 2010 (http://www.iajapan.org/press/20100325-press.html).
[243]『児童ポルノ排除総合対策』. 犯罪対策閣僚会議, July 2010 (http://www.kantei.go.jp/jp/singi/hanzai/kettei/100727/porno_hon.pdf).
[244]『ブロッキング』. JANOG26, July 2010 (http://www.janog.gr.jp/meeting/janog26/program/blocking.html).
[245]『児童ポルノ、サイト全体遮断へ ネット業者ら基準策定』. asahi.com, February 2011 (http://www.asahi.com/national/update/0225/TKY201102250700.html).
[246] "Taking Back the DNS". Internet Systems Consortium, July 2010(http://www.isc.org/community/blog/201007/taking-back-dns-0).
[247] "DNS Response Policy Zones (DNS RPZ)". Internet Systems Consortium, as of 2010 (ftp://ftp.isc.org/isc/dnsrpz/isc-tn-2010-1.txt).
[248]『急上昇ワードランキング- Yahoo!検索ランキング』. as of 2011 (http://searchranking.yahoo.co.jp/burst_ranking/).
[249]『今日の急上昇ワード(日本)』. Google トレンド, as of 2011 (http://www.google.co.jp/trends/hottrends).
[250]『WBC 優勝にわくネット 2ch サーバも落ちる』. ITmedia, March 2009(http://www.itmedia.co.jp/news/articles/0903/24/news055.html).
[251]『Twitter サーバ、「バルス」に勝つ』. ITmedia, November 2009 (http://www.itmedia.co.jp/news/articles/0911/24/news072.html).
[252]『米多発テロ事件でニュース/政府サイトにアクセス集中欧州にも飛び火バックボーンには影響ほとんどなし』. Internet Watch, September 2001 (http://www.watch.impress.co.jp/internet/www/article/2001/0913/kb.htm).
[253] R.Draves. "Default Address Selection for Internet Protocol version 6 (IPv6)". February 2003 (http://tools.ietf.org/html/rfc3484).
[254] "Akamai". as of 2011 (http://www.akamai.com/).
[255] "The Centers for Disease Control and Prevention Deploy Akamai EdgeSuite for Continuity of Global Web Operations". Akamai, January 2002 (http://www.akamai.com/html/about/press/releases/2002/press_012202.html).
[256] "Load Balancing". Government Computer News, March 2002 (http://gcn.com/Articles/2002/03/02/Load-Balancing.aspx).
[257] "Xero selects Akamai to accelerate its Business application, increasing performance by an average of 180 per cent". Akamai, June 2010 (http://www.akamai.com/html/about/press/releases/2010/press_062210.html).
[258] "Rackspace Hosting and Akamai Join Forces to Give Customers Faster Online Computing, Backed By Fanatical Support". Akamai, January 2011 (http://www.akamai.com/html/about/press/releases/2011/press_011211.html).
[259] "As Effects of Taiwan Earthquake Continue to Disrupt Internet Communications, Companies Find Business Continuity With Akamai". Akamai, January 2007 (http://www.akamai.com/html/about/press/releases/2007/press_013107.html).
[260]『中東で通信回線不通』. Akamai, January 2008 (http://www.akamai.co.jp/enja/mideast-outage).
[261]『アカマイ、最近の海底ケーブル切断によるインターネット遅延について独自の見解を表明』. Akamai, February 2008 (http://www.akamai.co.jp/enja/html/about/press/releases/2008/press_021308.html).
[262] "DDoS attack rains down on Amazon cloud". The Register, October 2009(http://www.theregister.co.uk/2009/10/05/amazon_bitbucket_outage/).
[263] "DDoS Attack Takes Down Amazon, Wal-Mart". Mashable, December 2009(http://mashable.com/2009/12/24/ddos-attack-amazon/).
[264]『ギャンブルサイトをDDoS 攻撃から救うサービス』. Wired Vision, January 2005 (http://wiredvision.jp/archives/200501/2005012602.html).
[265]『Web サイトを人質にとって「みかじめ料」を要求、DDoS 脅迫が日本にも上陸』. ITmedia, June 2007 (http://www.itmedia.co.jp/enterprise/articles/0706/20/news046.html).
[266]『DDoS やめてほしくば金払え个ア 多発する脅迫事件にラックが注意喚起』. IMPRESS, May 2008(http://cloud.watch.impress.co.jp/epw/cda/security/2008/05/15/12923.html).
[267] "Cybercrime... for sale (I)". PandaLabs Blog, April 2007 (http://pandalabs.pandasecurity.com/cybercrime-for-sale-i/).
[268] "Cybercrime... for sale (II)". PandaLabs Blog, May 2007 (http://pandalabs.pandasecurity.com/cybercrime-for-sale-ii/).
[269] "DDoS attacks threaten free speech, says report". NETWORK WORLD, December 2010(http://www.networkworld.com/news/2010/122210-ddosattacks-threaten-free-speech.html).
[270] P.Ferguson and D.Senie. "Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing". May 2000(http://tools.ietf.org/html/rfc2827).
[271] F.Baker and P.Savola. "Ingress Filtering for Multihomed Networks". March 2004 (http://tools.ietf.org/html/rfc3704).
[272]『電気通信事業者における大量通信等への対処と通信の秘密に関するガイドラインの改定について』. JAIPA, March 2011 (http://www.jaipa.or.jp/other/mtcs/info_110325.html).
[273] D.Turk. "Configuring BGP to Block Denial-of-Service Attacks". September 2004(http://tools.ietf.org/html/rfc3882).
[274] "REMOTELY TRIGGERED BLACK HOLE FILTERING - DESTINATION BASED AND SOURCE BASED". Cisco, 2005 (http://www.cisco.com/web/about/security/intelligence/blackhole.pdf).
[275]『世界のWeb トラフィック3割を配信するAkamai の創設者Tom Leighton 博士インタビュー』. Geek なぺーじ, February 2011 (http://www.geekpage.jp/blog/?id=2011/2/24/2).
[276] Jeffrey Travers and Stanley Milgram. "An Experimental Study of the Small World Problem". Sociometry, Vol. 32, pp. 425-443, 1969.
[277] Albert-Laszlo Barabasi. "Linked: The New Science of Networks". Basic Books, May 2002(青木薫訳『新ネットワーク思考世界のしくみを読み解く』NHK出版, 2002 年12 月).
[278] Mark S Granovetter. "The Strength of Weak Ties". American Journal of Sociology, Vol. 78, pp. 1360-1380, May 1973.
[279] Duncan J. Watts and Steven H Strogatz. "Collective dynamics of ’small-world’ networks". Nature, Vol. 393, pp. 440-442, June 2008 (http://www.nature.com/nature/journal/v393/n6684/abs/393440a0.html).
[280] Jon Crowcroft. "Cold Topics in Networking". ACM SIGCOMM Computer Communication Review, Vol. 38, No. 1, pp. 45-47, January 2008 (http://ccr.sigcomm.org/online/?q=node/305).
[281] Jon Crowcroft. "Reheating Cold Topics(in Networking)". ACM SIGCOMM Computer Communication Review, Vol. 39, No. 2, pp. 48-49, April 2009(http://ccr.sigcomm.org/online/?q=node/457).
[282] Albert-Laszlo Barabasi and Reka Albert. "Emergence of scaling in random networks". Science, Vol. 286, No. 5439, pp. 509-512, October 1999 (http://www.sciencemag.org/content/286/5439/509.abstract).
[283] Chris Anderson. "The Long Tail". Wired, October 2004 (http://www.wired.com/wired/archive/12.10/tail.html).
[284] Chavdar Dangalchev. "Generation models for scale-free networks". Physica A, Vol. 338, pp. 659-671, July 2004.
[285] Reka Albert, Hawoong Jeong, and Albert-Laszlo Barabasi. "Error and attack tolerance of complex networks". Nature, Vol. 406, pp. 378-382, June 2000(http://www.nature.com/nature/journal/v406/n6794/full/406378a0.html).
[286] Lun Li, David Alderson, Walter Willinger, and John Doyle. "A FirstPrinciples Approach to Understanding the Internet’s Routerlevel Topology". SIGCOMM’ 04, August 2004 (http://www.sigcomm.org/sigcomm2004/papers/p599-li.pdf).
[287] Lixin Gao. "On inferring autonomous system relationships in the internet". IEEE/ACM Transactions on Networking (TON), Vol. 9, No. 6, December 2001(http://portal.acm.org/citation.cfm?id=504616).
[288] "CAIDA : AS Relationships". as of 2010 (http://www.caida.org/data/active/as-relationships/).
[289] Ying-Ju Chi, Ricardo Oliveira, and Lixia Zhang. "Cyclops: the AS-level connectivity observatory". ACM SIGCOMM Computer Communication Review, Vol. 38, No. 5, pp. 5-16, October 2008 (http://portal.acm.org/citation.cfm?id=1452335.1452337).
[290] "Comcast Squeezes Money From Level 3 For Streaming Video". paidContent, November 2010 (http://paidcontent.org/article/419-comcastsqueezes-money-from-level-3-for-streaming-video/).
[291] "Comcast Comments on Level3". The Official Comcast Blog, November 2010 (http://blog.comcast.com/2010/11/comcast-comments-on-level-3.html).
[292] "Level 3 Communications Issues Statement Concerning Comcast’s Actions".Level3, November 2010 (http://www.level3.com/en/About-Us/Newsroom/Press-Release-Archive/2010/2010-11-29-level3-statement-comcast.aspx).
[293] "Cogent Completes PSINet Acquisition". InternetNews.com, April 2002 (http://www.internetnews.com/bus-news/article.php/1002851).
[294] "Telstra buys PSINet UK". The Register, August 2004 (http://www.theregister.co.uk/2004/08/26/telstra_psinet/).
[295] "TELUS completes purchase of PSINet Canada". TELUS, October 2001 (http://about.telus.com/cgi-bin/news_viewer_ir.cgi?news_id=279&mode=2&news_year=2001).
[296] "VIA NET.WORKS buys PSINet Europe...but not UK". The Register, August 2004 (http://www.theregister.co.uk/2004/08/17/psinet_via_brightview/).
[297]『インターネットの遮断が発生-大手回線事業者の対立が原因』. CNET Japan, October 2005(http://japan.cnet.com/news/media/story/0,2000056023,20088338,00.htm).
[298] "You can’t get there from here". Renesys Blog, March 2008 (http://www.renesys.com/blog/2008/03/you-cant-get-there-from-here-1.shtml).
[299] "Wrestling With the Zombie: Sprint Depeers Cogent, Internet Partitioned". Renesys Blog, October 2008 (http://www.renesys.com/blog/2008/10/wrestling-with-the-zombie-spri.shtml).
[300] Craig Labovitz, Danny McPherson, and Scott Iekel-Johnson. "2009 Internet Observatory Report". NANOG47, October 2009(http://www.nanog.org/meetings/nanog47/abstracts.php?pt=MTQ1MyZuYW5vZzQ3&nm=nanog47).
[301] Craig Labovitz, Scott Iekel-Johnson, Danny McPherson, Jon Oberheide, and Farnam Jahanian. "Internet inter-domain traffic". Proceedings of the ACM SIGCOMM 2010 conference on SIGCOMM, pp. 75-86, September 2010 (http://portal.acm.org/citation.cfm?id=1851182.1851194).
[302] "Google Sets New Internet Traffic Record". Arbor Networks Blog, October 2010 (http://asert.arbornetworks.com/2010/10/google-breakstraffic-record/).
[303] "Google makes video play with YouTube buy". CNET News, October 2006 (http://news.cnet.com/Google-makes-video-play-with-YouTubebuy/2100-1030_3-6124094.html).
[304] "Google Global Cache". Google, as of 2011 (http://ggcadmin.google.com/ggc).
[305] "Peering Policy". LACNIC, June 2008 (http://lacnic.net/documentos/lacnicxi/presentaciones/Google-LACNIC-final-short.pdf).
[306] "The Value of Content Distribution Networks". AfNOG, June 2008(http://www.afnog.org/afnog2008/conference/talks/Google-AFNOGpresentation-public.pdf).
[307]『DTI、通信環境高速化に向けAkamai やGoogle のネットワークと接続』. INTERNET Watch, April 2010 (http://internet.watch.impress.co.jp/docs/news/20100426_364046.html).
[308]『日本のトラフィックってどうなってるの?!』. JANOG27, January 2011(http://www.janog.gr.jp/meeting/janog27/program/mic.html).
[309] "Ustream.TV". as of 2011 (http://www.ustream.tv/).
[310] "Akamai Net Usage Index". as of 2011 (http://www.akamai.com/html/technology/nui/news/index.html).
[311]『Akamai ニュースサイト』. as of 2011 (http://www.akamai.co.jp/enja/html/technology/nui/news/sites.html).
[312] "Akamai Cancels a Contract for Arabic Network’s Site". NYTimes.com, April 2003 (http://www.nytimes.com/2003/04/04/technology/04WEB.html).
[313] "Forecast and Methodology, 2009-2014". Cisco Visual Networking Index, June 2010 (http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-481360_ns827_Networking_Solutions_White_Paper.html).
[314]『我が国のインターネットにおけるトラヒックの集計・試算2010年5月時点の集計結果の公表』. 総務省, September 2010 (http://www.soumu.go.jp/menu_news/s-news/01kiban04_01000001.html).
[315] "MTR" (http://www.bitwizard.nl/mtr/).
[316] Matthew Luckie, Young Hyun, and Bradley Huffaker. "Traceroute probe method and forward IP path inference". 2008 (http://doi.acm.org/10.1145/1452520.1452557).
[317] Brice Augustin, Timur Friedman, and Renata Teixeira. "Measuring loadbalanced paths in the internet". 2007(http://doi.acm.org/10.1145/1298306.1298329).
[318] "Reverse traceroute" (http://www.cs.washington.edu/research/networking/astronomy/reverse-traceroute.html).
[319] Rupa Krishnan, Harsha V. Madhyastha, Sridhar Srinivasan, Sushant Jain, Arvind Krishnamurthy, Thomas Anderson, and Jie Gao. "Moving beyond end-to-end path information to optimize CDN performance". 2009(http://doi.acm.org/10.1145/1644893.1644917).
[320] "PlanetLab" (http://www.planet-lab.org/).
[321] J.Postel. "Internet Protocol". September 1981 (http://tools.ietf.org/html/rfc791).
[322] Ethan Katz-Bassett, Harsha V. Madhyastha, Vijay Kumar Adhikari, Colin Scott, Justine Sherry, Peter Van Wesep, Thomas Anderson, and Arvind Krishnamurthy. "Reverse traceroute". 2010 (http://portal.acm.org/citation.cfm?id=1855711.1855726).
[323] Kai Chen, David R. Choffnes, Rahul Potharaju, Yan Chen, Fabian E. Bustamante, Dan Pei, and Yao Zhao. "Where the sidewalk ends: extending the internet as graph using traceroutes from P2P users". 2009 (http://doi.acm.org/10.1145/1658939.1658964).
[324] Ramesh Govindan Hongsuda, Ramesh Govindan, and Hongsuda Tangmunarunkit. "Heuristics for Internet Map Discovery". 2000(http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=832534).
[325] Neil Spring, Ratul Mahajan, DavidWetherall, and Thomas Anderson. "Measuring ISP topologies with rocketfuel". 2004 (http://dx.doi.org/10.1109/TNET.2003.822655).
[326] Damien Magoni and Mickaël Hoerdt. "Internet core topology mapping and analysis". Comput. Commun., 2005(http://portal.acm.org/citation.cfm?id=1646671.1647192).
[327] "CAIDA - skitter"(http://www.caida.org/tools/measurement/skitter/).
[328] "iPlane: An Information Plane for Distributed Services" (http://iplane.cs.washington.edu/).
[329] "The DIMES project" (http://www.netdimes.org/new/).
[330] "Northwestern University, AquaLab". Ono plugin for the Vuze (Azureus) BitTorrent Client, as of 2010 (http://www.aqualab.cs.northwestern.edu/projects/Ono.html).
[331] "BitTorrent, Inc. Grows to Over 100 Million Active Monthly Users: Massive User Base Provides New Distribution Opportunities for Content Creators" (http://www.bittorrent.com/intl/pressreleases/company/about/bittorrent_inc_grows_to_over_100_million_active_monthly_users_massive_user).
[332] "traceroute.org" (http://www.traceroute.org/).
[333] "bgp4.net" (http://bgp4.net/).
[334] "TeliaSonera Looking Glass" (http://lg.telia.ru/).
[335] "Google help: What is 1e100.net?" (http://www.google.com/support/bin/answer.py?hlrm=en&answer=174717&&hl=en).
[336] "Hurricane Electric BGP Toolkit" (http://bgp.he.net/).
[337] "MAPPING THE IPV4 ADDRESS SPACE" (http://maps.measurementfactory.com/).
[338] "IP to ASN Mapping - Team Cymru" (http://www.team-cymru.org/Services/ip-to-asn.html).
[339] "Team Cymru IP to ASN Lookup v1.0" (http://asn.cymru.com/).
[340] "Route Views Project Page" (http://www.routeviews.org/).
[341] "Routing Information Service (RIS) Welcome to the RIPE Network Coordination Centre" (http://www.ripe.net/data-tools/stats/ris).
[342] "Global Research NOC - Research Data" (http://noc.net.internet2.edu/i2network/research-data.html).
[343] "Packet Clearing House (PCH) - Packet Clearing House"(http://www.pch.net/home/index.php).
[344] "Cyclops". as of 2010 (http://cyclops.cs.ucla.edu/).
[345] "BGPlay @ Route Views" (http://bgplay.routeviews.org/).
[346] "Renesys - Egypt Leaves the Internet"(http://www.renesys.com/blog/2011/01/egypt-leaves-the-internet.shtml).
[347] "Renesys - Egypt Returns To The Internet" (http://www.renesys.com/blog/2011/02/egypt-returns-to-the-internet.shtml).
[348] "Overview of the Egyptian Internet Shutdown" (http://www.pch.net/resources/misc/Egypt-PCH-Overview.pdf).
[349] "CAIDA AS Rank:AS Ranking" (http://as-rank.caida.org/).
[350] "CAIDA - Visualizing IPv4 and IPv6 Internet Topology at a Macroscopic Scale"(http://www.caida.org/research/topology/as_core_network/).
[351] Ethan Katz-Bassett, Harsha V. Madhyastha, John P. John, Arvind Krishnamurthy, David Wetherall, and Thomas Anderson. "Studying black holes in the internet with Hubble". pp. 247-262, 2008(http://portal.acm.org/citation.cfm?id=1387589.1387607).
[352] "Internet Full of ’Black Holes’" (http://www.livescience.com/technology/080411-cyber-black-holes.html).
[353] "Researchers map Internet’s ’black holes’" (http://www.computerworld.com.au/article/212392/researchers_map_internet_black_holes_/).
[354] "The PingER Project" (http://www-iepm.slac.stanford.edu/pinger/).
[355] "PingER data for Africa" (http://sdu.ictp.it/pinger/africa.html).
[356]『Akamai - Net Usage Index:ニュース』(http://www.akamai.co.jp/enja/html/technology/nui/news/index.html).
[357] "Submarine Cable Map 2011: Maps: TeleGeography Research" (http:/www.telegeography.com/telecom-resources/map-gallery/).
[358] "Submarine Cable Map 2011" (http://www.telegeography.com/telecomresources/map-gallery/submarine-cable-map-2011/index.html).
[359] "Greg’s Cable Map" (http://www.cablemap.info/).
[360] "GLIF: Global Lambda Integrated Facility" (http://www.glif.is/).