Next Steps in Security for Time Synchronization: Experiences from implementing IEEE 1588 v2.1.
Ezzeldin ShereenFlorian BitardGyörgy DánTolga SelSteffen FriesPublished in: ISPCS (2019)
Keyphrases
- security issues
- security requirements
- case study
- intrusion detection
- security systems
- physical layer
- access control
- information security
- security problems
- database
- wireless local area network
- intelligent agent technology
- data security
- information assurance
- security threats
- statistical databases
- network security
- peer to peer
- security mechanisms
- functional requirements
- security properties
- distributed systems
- medium access control
- information systems
- social networks