Login / Signup
Validating a custom IPv6 security application using OPNET modeler.
Brittany Clore
Matthew Dunlop
Randy C. Marchany
Joseph G. Tront
Published in:
MILCOM (2012)
Keyphrases
</>
information security
network connection
data sets
decision support
application specific
intrusion detection
end to end
network security
key technologies