Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
policy-based routing security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/131)
Export
export all inquiry results
(1)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
An expectation-based approach to policy-based security of the Border Gateway Protocol
Li, Jun
;
Stein, Josh
;
Zhang, Mingwei
;
Maennel, Olaf Manuel
2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) : GI 2016 : IEEE Global Internet Symposium : April 10-14, 2016, San Francisco, CA, USA
2016
/
p. 340-345 : ill
https://doi.org/10.1109/INFCOMW.2016.7562098
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
Number of records 1, displaying
1 - 1
keyword
129
1.
policy-based routing security
2.
routing policy
3.
logic-based distributed routing
4.
security policy
5.
borrower-based policy measures
6.
evidence based policy
7.
place-based policy
8.
bandwidth-aware adaptive routing
9.
congestion-aware adaptive routing
10.
contention-aware adaptive routing
11.
data routing
12.
geographic routing
13.
inventory routing problem
14.
inventory routing problem (IRP)
15.
multi-hop routing protocol
16.
optimized routing approach for critical and emergency networks
17.
optimized routing approach for critical and emergency networks simulations
18.
Routing
19.
routing algorithm
20.
routing algorithms
21.
routing closure
22.
routing logic
23.
routing protocols
24.
ship routing
25.
tactical multi-hop routing protocol
26.
3D routing
27.
ad-hoc sensor networks security
28.
Automatic Security Verification
29.
Blockchain security
30.
cache security
31.
communication system security
32.
comprehensive system of economic security
33.
computer security
34.
cooperative security dilemma
35.
cyber security
36.
cyber security education
37.
cyber security exercises
38.
cyber security monitoring
39.
cyber security strategies
40.
cyber-security
41.
data security
42.
development of security cameras
43.
digital security practices
44.
drinking water security
45.
economic security
46.
economic security of enterprise
47.
emotional security
48.
energy security
49.
energy security indicator
50.
Estonian information security standard
51.
graded security
52.
hardware security
53.
hardware security primitive
54.
human security
55.
information security
56.
information security and privacy
57.
internal security
58.
international security
59.
investment and innovation security
60.
IPv6 security
61.
IT security
62.
IT security management
63.
job security
64.
long-term security
65.
metadata model for security measures
66.
Middle Eastern security
67.
Mobile security
68.
national cyber security strategy
69.
national security
70.
NATO. Science for Peace and Security Program
71.
network security
72.
network security monitoring
73.
OSCE (Organization for Security and Co-operation in Europe)
74.
passenger’s security
75.
political and security cultures
76.
post-quantum security
77.
power system security
78.
quantitative security
79.
regional security
80.
RISC-V Security Verification
81.
safety and security testing
82.
security
83.
security adaptation
84.
security alert prioritization
85.
security analysis
86.
security and justice (AFSJ)
87.
Security and political science
88.
security and privacy
89.
security and privacy in smart grids
90.
Security Assertion Mining
91.
security closure
92.
Security Coverage
93.
security dataset
94.
security dilemma
95.
Security evaluation
96.
security evaluation instruments
97.
Security limitations
98.
security log analysis
99.
security management
100.
security model
101.
security monitoring
102.
security notion
103.
security objectives
104.
security of data
105.
security of supply
106.
security operation center
107.
security operations center
108.
security patterns
109.
security problem definition
110.
security proof
111.
security protocols
112.
security requirements
113.
security requirements engineering
114.
security risk assessment
115.
security risk management
116.
security risks
117.
security strategies
118.
security systems for military objects
119.
security testing
120.
security training
121.
security verification
122.
security-by-design
123.
social security planning
124.
societal security
125.
system of economic security
126.
system security
127.
terrorism security
128.
transmission System Security
129.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT