Short Paper: On Deployment of DNS-based Security Enhancements.
Pawel SzalachowskiAdrian PerrigPublished in: CoRR (2017)
Keyphrases
- information security
- information assurance
- computer security
- access control
- security policies
- network security
- statistical databases
- security problems
- intrusion detection
- security issues
- security requirements
- security protocols
- data security
- data mining
- database systems
- real time
- genetic algorithm
- data integrity
- security systems
- security properties
- data sets