The Blind Man's Bluff Approach to Security Using IPv6.
Matthew DunlopStephen GroatWilliam UrbanskiRandy C. MarchanyJoseph G. TrontPublished in: IEEE Secur. Priv. (2012)
Keyphrases
- information security
- security issues
- information assurance
- intrusion detection
- network layer
- security policies
- security problems
- campus network
- security requirements
- functional requirements
- cyber security
- application layer
- security properties
- access control
- statistical databases
- countermeasures
- network traffic
- key management
- security systems
- end to end