On the deployability of inter-AS spoofing defenses | IEEE Journals & Magazine | IEEE Xplore