Attack-aware Security Function Chain Reordering.
Lukas IffländerNishant RawtaniLukas BeierliebNicolas FellaKlaus-Dieter LangeSamuel KounevPublished in: CoRR (2020)
Keyphrases
- security measures
- security vulnerabilities
- fault injection
- key exchange protocol
- intrusion detection
- statistical databases
- malicious attacks
- denial of service attacks
- malicious users
- cyber attacks
- information security
- security issues
- security problems
- countermeasures
- security policies
- network security
- computer security
- forensic analysis
- access control
- security requirements
- cloud computing