Login / Signup

Validating a custom IPv6 security application using OPNET modeler.

Brittany CloreMatthew DunlopRandy C. MarchanyJoseph G. Tront
Published in: MILCOM (2012)
Keyphrases
  • information security
  • network connection
  • data sets
  • decision support
  • application specific
  • intrusion detection
  • end to end
  • network security
  • key technologies