Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
policy-based routing security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/148)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
An expectation-based approach to policy-based security of the Border Gateway Protocol
Li, Jun
;
Stein, Josh
;
Zhang, Mingwei
;
Maennel, Olaf Manuel
2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) : GI 2016 : IEEE Global Internet Symposium : April 10-14, 2016, San Francisco, CA, USA
2016
/
p. 340-345 : ill
https://doi.org/10.1109/INFCOMW.2016.7562098
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
Number of records 1, displaying
1 - 1
keyword
146
1.
policy-based routing security
2.
routing policy
3.
logic-based distributed routing
4.
security policy
5.
borrower-based policy measures
6.
evidence based policy
7.
place-based policy
8.
bandwidth-aware adaptive routing
9.
congestion-aware adaptive routing
10.
contention-aware adaptive routing
11.
data routing
12.
geographic routing
13.
inventory routing problem
14.
inventory routing problem (IRP)
15.
multi-hop routing protocol
16.
optimized routing approach for critical and emergency networks
17.
optimized routing approach for critical and emergency networks simulations
18.
quantum-enhanced secure and energy-efficient routing (QSEER) protocol
19.
Routing
20.
routing algorithm
21.
routing algorithms
22.
routing closure
23.
routing logic
24.
routing protocol
25.
routing protocols
26.
ship routing
27.
tactical multi-hop routing protocol
28.
3D routing
29.
ad-hoc sensor networks security
30.
Automatic Security Verification
31.
Blockchain security
32.
cache security
33.
communication system security
34.
comprehensive system of economic security
35.
computer security
36.
cooperative security dilemma
37.
cyber security
38.
cyber security education
39.
cyber security exercises
40.
cyber security monitoring
41.
cyber security strategies
42.
cyber-security
43.
data and information security
44.
data security
45.
development of security cameras
46.
digital security practices
47.
drinking water security
48.
economic security
49.
economic security of enterprise
50.
emotional security
51.
energy security
52.
energy security indicator
53.
Estonian information security standard
54.
graded security
55.
hardware security
56.
hardware security primitive
57.
high level of security
58.
Homeland security
59.
human security
60.
information security
61.
information security and privacy
62.
initial level of security
63.
internal security
64.
international security
65.
investment and innovation security
66.
IPv6 security
67.
IT security
68.
IT security management
69.
job security
70.
long-term security
71.
maritime cyber security
72.
maritime cyber security operations centers
73.
Maritime Security Operations Center (M-SOC)
74.
medium level of security
75.
metadata model for security measures
76.
Middle Eastern security
77.
Mobile security
78.
national cyber security strategy
79.
national security
80.
NATO. Science for Peace and Security Program
81.
network security
82.
network security monitoring
83.
OSCE (Organization for Security and Co-operation in Europe)
84.
passenger’s security
85.
political and security cultures
86.
post-quantum security
87.
power system security
88.
quantitative security
89.
regional security
90.
RISC-V Security Verification
91.
Safety and Security in Sea Transportation
92.
safety and security testing
93.
security
94.
security adaptation
95.
security alert prioritization
96.
security analysis
97.
security and justice (AFSJ)
98.
Security and political science
99.
security and privacy
100.
security and privacy in smart grids
101.
Security Assertion Mining
102.
security closure
103.
Security Coverage
104.
security dataset
105.
security dilemma
106.
Security evaluation
107.
security evaluation instruments
108.
Security limitations
109.
security log analysis
110.
security management
111.
security model
112.
security monitoring
113.
security notion
114.
security objectives
115.
security of data
116.
security of supply
117.
security operation center
118.
security operations center
119.
security patterns
120.
security problem definition
121.
security proof
122.
security protocols
123.
security requirements
124.
security requirements engineering
125.
security research
126.
security risk assessment
127.
security risk management
128.
security risks
129.
security science and technology
130.
security strategies
131.
security systems for military objects
132.
security testing
133.
security training
134.
security verification
135.
security-by-design
136.
social security planning
137.
societal security
138.
software security
139.
software security level
140.
software security subcharacteristics
141.
sufficient level of security
142.
system of economic security
143.
system security
144.
terrorism security
145.
transmission System Security
146.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT