BGP Security in Partial Deployment: Is the Juice Worth the Squeeze?
Robert LychevSharon GoldbergMichael SchapiraPublished in: CoRR (2013)
Keyphrases
- information security
- security requirements
- intrusion detection
- access control
- security issues
- information assurance
- anomaly detection
- security problems
- security analysis
- statistical databases
- security mechanisms
- security protocols
- data security
- network security
- security policies
- key management
- cyber security
- security properties
- security threats
- functional requirements
- security level
- databases
- biometric systems
- neural network