Survey on DNS configurations, interdependencies, resilience and security for *.ke domains.
James G. KagweMuthoni MasindePublished in: ACM DEV (2012)
Keyphrases
- ban logic
- security level
- computer security
- information security
- application domains
- statistical databases
- real world
- security issues
- intrusion detection
- formal analysis
- access control
- security threats
- security requirements
- security mechanisms
- key management
- distributed systems
- load balancing
- complex domains
- data security
- security systems
- security problems
- information assurance
- neural network