A Composable Security Treatment of the Lightning Network.
Aggelos KiayiasOrfeas Stefanos Thyfronitis LitosPublished in: CSF (2020)
Keyphrases
- network management
- network monitoring
- network administrators
- security threats
- network services
- intrusion detection
- security measures
- internet service providers
- computer networks
- network security
- network model
- peer to peer
- network access
- network communication
- enterprise network
- network connection
- virtual private network
- security issues
- access control
- security policies
- network architecture
- information security
- complex networks
- intrusion detection and prevention
- buffer overflow
- intrusion prevention
- wireless sensor networks
- security architecture
- denial of service attacks
- application level
- network resources
- network traffic
- network structure