Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
policy-based routing security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/148)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus EST
/
artikkel kogumikus ENG
An expectation-based approach to policy-based security of the Border Gateway Protocol
Li, Jun
;
Stein, Josh
;
Zhang, Mingwei
;
Maennel, Olaf Manuel
2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) : GI 2016 : IEEE Global Internet Symposium : April 10-14, 2016, San Francisco, CA, USA
2016
/
p. 340-345 : ill
https://doi.org/10.1109/INFCOMW.2016.7562098
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
146
1.
policy-based routing security
2.
routing policy
3.
logic-based distributed routing
4.
security policy
5.
borrower-based policy measures
6.
evidence based policy
7.
place-based policy
8.
bandwidth-aware adaptive routing
9.
congestion-aware adaptive routing
10.
contention-aware adaptive routing
11.
data routing
12.
geographic routing
13.
inventory routing problem
14.
inventory routing problem (IRP)
15.
multi-hop routing protocol
16.
optimized routing approach for critical and emergency networks
17.
optimized routing approach for critical and emergency networks simulations
18.
quantum-enhanced secure and energy-efficient routing (QSEER) protocol
19.
Routing
20.
routing algorithm
21.
routing algorithms
22.
routing closure
23.
routing logic
24.
routing protocol
25.
routing protocols
26.
ship routing
27.
tactical multi-hop routing protocol
28.
3D routing
29.
ad-hoc sensor networks security
30.
Automatic Security Verification
31.
Blockchain security
32.
cache security
33.
communication system security
34.
comprehensive system of economic security
35.
computer security
36.
cooperative security dilemma
37.
cyber security
38.
cyber security education
39.
cyber security exercises
40.
cyber security monitoring
41.
cyber security strategies
42.
cyber-security
43.
data and information security
44.
data security
45.
development of security cameras
46.
digital security practices
47.
drinking water security
48.
economic security
49.
economic security of enterprise
50.
emotional security
51.
energy security
52.
energy security indicator
53.
Estonian information security standard
54.
graded security
55.
hardware security
56.
hardware security primitive
57.
high level of security
58.
Homeland security
59.
human security
60.
information security
61.
information security and privacy
62.
initial level of security
63.
internal security
64.
international security
65.
investment and innovation security
66.
IPv6 security
67.
IT security
68.
IT security management
69.
job security
70.
long-term security
71.
maritime cyber security
72.
maritime cyber security operations centers
73.
Maritime Security Operations Center (M-SOC)
74.
medium level of security
75.
metadata model for security measures
76.
Middle Eastern security
77.
Mobile security
78.
national cyber security strategy
79.
national security
80.
NATO. Science for Peace and Security Program
81.
network security
82.
network security monitoring
83.
OSCE (Organization for Security and Co-operation in Europe)
84.
passenger’s security
85.
political and security cultures
86.
post-quantum security
87.
power system security
88.
quantitative security
89.
regional security
90.
RISC-V Security Verification
91.
Safety and Security in Sea Transportation
92.
safety and security testing
93.
security
94.
security adaptation
95.
security alert prioritization
96.
security analysis
97.
security and justice (AFSJ)
98.
Security and political science
99.
security and privacy
100.
security and privacy in smart grids
101.
Security Assertion Mining
102.
security closure
103.
Security Coverage
104.
security dataset
105.
security dilemma
106.
Security evaluation
107.
security evaluation instruments
108.
Security limitations
109.
security log analysis
110.
security management
111.
security model
112.
security monitoring
113.
security notion
114.
security objectives
115.
security of data
116.
security of supply
117.
security operation center
118.
security operations center
119.
security patterns
120.
security problem definition
121.
security proof
122.
security protocols
123.
security requirements
124.
security requirements engineering
125.
security research
126.
security risk assessment
127.
security risk management
128.
security risks
129.
security science and technology
130.
security strategies
131.
security systems for military objects
132.
security testing
133.
security training
134.
security verification
135.
security-by-design
136.
social security planning
137.
societal security
138.
software security
139.
software security level
140.
software security subcharacteristics
141.
sufficient level of security
142.
system of economic security
143.
system security
144.
terrorism security
145.
transmission System Security
146.
voting privacy and security
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT