Login / Signup
Proof of Network Security Services: Enforcement of Security SLA through Outsourced Network Testing.
Sultan Alasmari
Weichao Wang
Yu Wang
Published in:
ICCNS (2020)
Keyphrases
</>
access control
network traffic
security services
peer to peer
computer networks
network management
information technology
user behavior
network structure
key management
security protocols