Implementing Attack-aware Security Function Chain Reordering.
Lukas IffländerLukas BeierliebNicolas FellaSamuel KounevNishant RawtaniKlaus-Dieter LangePublished in: ACSOS Companion (2020)
Keyphrases
- security measures
- network security
- key exchange protocol
- malicious users
- authentication protocol
- malicious attacks
- cyber attacks
- taking care
- statistical databases
- security vulnerabilities
- countermeasures
- encryption algorithm
- fault injection
- denial of service attacks
- dos attacks
- information security
- security threats
- security properties
- lightweight
- security model
- security analysis
- key management
- security issues
- key agreement