Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
policy-based routing security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/153)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
An expectation-based approach to policy-based security of the Border Gateway Protocol
Li, Jun
;
Stein, Josh
;
Zhang, Mingwei
;
Maennel, Olaf Manuel
2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) : GI 2016 : IEEE Global Internet Symposium : April 10-14, 2016, San Francisco, CA, USA
2016
/
p. 340-345 : ill
https://doi.org/10.1109/INFCOMW.2016.7562098
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
Number of records 1, displaying
1 - 1
keyword
151
1.
policy-based routing security
2.
routing policy
3.
logic-based distributed routing
4.
security policy
5.
borrower-based policy measures
6.
evidence based policy
7.
place-based policy
8.
bandwidth-aware adaptive routing
9.
congestion-aware adaptive routing
10.
contention-aware adaptive routing
11.
data routing
12.
geographic routing
13.
inventory routing problem
14.
inventory routing problem (IRP)
15.
multi-hop routing protocol
16.
optimized routing approach for critical and emergency networks
17.
optimized routing approach for critical and emergency networks simulations
18.
quantum-enhanced secure and energy-efficient routing (QSEER) protocol
19.
Routing
20.
routing algorithm
21.
routing algorithms
22.
routing closure
23.
routing logic
24.
routing protocol
25.
routing protocols
26.
ship routing
27.
tactical multi-hop routing protocol
28.
3D routing
29.
ad-hoc sensor networks security
30.
Automatic Security Verification
31.
Blockchain security
32.
cache security
33.
cloud security
34.
communication system security
35.
comprehensive system of economic security
36.
computer security
37.
cooperative security dilemma
38.
cyber security
39.
cyber security education
40.
cyber security exercises
41.
cyber security monitoring
42.
cyber security monitoring in maritime
43.
cyber security strategies
44.
cyber-physical system security
45.
cyber-security
46.
data and information security
47.
data security
48.
development of security cameras
49.
digital security practices
50.
drinking water security
51.
economic security
52.
economic security of enterprise
53.
emotional security
54.
energy security
55.
energy security indicator
56.
Estonian information security standard
57.
graded security
58.
hardware security
59.
hardware security primitive
60.
high level of security
61.
Homeland security
62.
human security
63.
information security
64.
information security and privacy
65.
initial level of security
66.
internal security
67.
international security
68.
investment and innovation security
69.
IPv6 security
70.
IT security
71.
IT security management
72.
job security
73.
long-term security
74.
maritime cyber security
75.
maritime cyber security operations centers
76.
Maritime Security Operations Center (M-SOC)
77.
medium level of security
78.
metadata model for security measures
79.
Middle Eastern security
80.
Mobile security
81.
national cyber security strategy
82.
national security
83.
NATO. Science for Peace and Security Program
84.
network security
85.
network security monitoring
86.
OSCE (Organization for Security and Co-operation in Europe)
87.
passenger’s security
88.
political and security cultures
89.
post-quantum security
90.
power system security
91.
quantitative security
92.
regional security
93.
RISC-V Security Verification
94.
Safety and Security in Sea Transportation
95.
safety and security testing
96.
security
97.
security adaptation
98.
security alert prioritization
99.
security analysis
100.
security and justice (AFSJ)
101.
Security and political science
102.
security and privacy
103.
security and privacy in smart grids
104.
Security Assertion
105.
Security Assertion Mining
106.
security closure
107.
Security Coverage
108.
security dataset
109.
security dilemma
110.
Security evaluation
111.
security evaluation instruments
112.
Security Level Evaluation
113.
Security limitations
114.
security log analysis
115.
security management
116.
security model
117.
security monitoring
118.
security notion
119.
security objectives
120.
security of data
121.
security of supply
122.
security operation center
123.
security operations center
124.
security patterns
125.
security problem definition
126.
security proof
127.
security protocols
128.
security requirements
129.
security requirements engineering
130.
security research
131.
security risk assessment
132.
security risk management
133.
security risks
134.
security science and technology
135.
security strategies
136.
security systems for military objects
137.
security testing
138.
security training
139.
security verification
140.
security-by-design
141.
social security planning
142.
societal security
143.
software security
144.
software security level
145.
software security subcharacteristics
146.
sufficient level of security
147.
system of economic security
148.
system security
149.
terrorism security
150.
transmission System Security
151.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT