RPKI vs ROVER: Comparing the Risks of BGP Security Solutions.
Aanchal MalhotraSharon GoldbergPublished in: IACR Cryptol. ePrint Arch. (2014)
Keyphrases
- risk analysis
- risk assessment
- anomaly detection
- security systems
- access control
- intrusion detection
- risk management
- information security
- decision making
- security policies
- network security
- benchmark problems
- stereo vision
- security issues
- security mechanisms
- security threats
- security risks
- security measures
- project management
- vision system
- decision support system
- functional requirements
- optimal solution
- computer security
- security analysis
- information systems
- security patterns