BGP security in partial deployment: is the juice worth the squeeze?
Robert LychevSharon GoldbergMichael SchapiraPublished in: SIGCOMM (2013)
Keyphrases
- security policies
- intrusion detection
- information security
- anomaly detection
- security issues
- computer security
- security problems
- security systems
- network security
- security requirements
- access control
- security management
- security threats
- security level
- information assurance
- cyber attacks
- security analysis
- security mechanisms
- encryption scheme
- network management