Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
policy-based routing security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/149)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus EST
/
artikkel kogumikus ENG
An expectation-based approach to policy-based security of the Border Gateway Protocol
Li, Jun
;
Stein, Josh
;
Zhang, Mingwei
;
Maennel, Olaf Manuel
2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) : GI 2016 : IEEE Global Internet Symposium : April 10-14, 2016, San Francisco, CA, USA
2016
/
p. 340-345 : ill
https://doi.org/10.1109/INFCOMW.2016.7562098
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
147
1.
policy-based routing security
2.
routing policy
3.
logic-based distributed routing
4.
security policy
5.
borrower-based policy measures
6.
evidence based policy
7.
place-based policy
8.
bandwidth-aware adaptive routing
9.
congestion-aware adaptive routing
10.
contention-aware adaptive routing
11.
data routing
12.
geographic routing
13.
inventory routing problem
14.
inventory routing problem (IRP)
15.
multi-hop routing protocol
16.
optimized routing approach for critical and emergency networks
17.
optimized routing approach for critical and emergency networks simulations
18.
quantum-enhanced secure and energy-efficient routing (QSEER) protocol
19.
Routing
20.
routing algorithm
21.
routing algorithms
22.
routing closure
23.
routing logic
24.
routing protocol
25.
routing protocols
26.
ship routing
27.
tactical multi-hop routing protocol
28.
3D routing
29.
ad-hoc sensor networks security
30.
Automatic Security Verification
31.
Blockchain security
32.
cache security
33.
communication system security
34.
comprehensive system of economic security
35.
computer security
36.
cooperative security dilemma
37.
cyber security
38.
cyber security education
39.
cyber security exercises
40.
cyber security monitoring
41.
cyber security strategies
42.
cyber-security
43.
data and information security
44.
data security
45.
development of security cameras
46.
digital security practices
47.
drinking water security
48.
economic security
49.
economic security of enterprise
50.
emotional security
51.
energy security
52.
energy security indicator
53.
Estonian information security standard
54.
graded security
55.
hardware security
56.
hardware security primitive
57.
high level of security
58.
Homeland security
59.
human security
60.
information security
61.
information security and privacy
62.
initial level of security
63.
internal security
64.
international security
65.
investment and innovation security
66.
IPv6 security
67.
IT security
68.
IT security management
69.
job security
70.
long-term security
71.
maritime cyber security
72.
maritime cyber security operations centers
73.
Maritime Security Operations Center (M-SOC)
74.
medium level of security
75.
metadata model for security measures
76.
Middle Eastern security
77.
Mobile security
78.
national cyber security strategy
79.
national security
80.
NATO. Science for Peace and Security Program
81.
network security
82.
network security monitoring
83.
OSCE (Organization for Security and Co-operation in Europe)
84.
passenger’s security
85.
political and security cultures
86.
post-quantum security
87.
power system security
88.
quantitative security
89.
regional security
90.
RISC-V Security Verification
91.
Safety and Security in Sea Transportation
92.
safety and security testing
93.
security
94.
security adaptation
95.
security alert prioritization
96.
security analysis
97.
security and justice (AFSJ)
98.
Security and political science
99.
security and privacy
100.
security and privacy in smart grids
101.
Security Assertion Mining
102.
security closure
103.
Security Coverage
104.
security dataset
105.
security dilemma
106.
Security evaluation
107.
security evaluation instruments
108.
Security Level Evaluation
109.
Security limitations
110.
security log analysis
111.
security management
112.
security model
113.
security monitoring
114.
security notion
115.
security objectives
116.
security of data
117.
security of supply
118.
security operation center
119.
security operations center
120.
security patterns
121.
security problem definition
122.
security proof
123.
security protocols
124.
security requirements
125.
security requirements engineering
126.
security research
127.
security risk assessment
128.
security risk management
129.
security risks
130.
security science and technology
131.
security strategies
132.
security systems for military objects
133.
security testing
134.
security training
135.
security verification
136.
security-by-design
137.
social security planning
138.
societal security
139.
software security
140.
software security level
141.
software security subcharacteristics
142.
sufficient level of security
143.
system of economic security
144.
system security
145.
terrorism security
146.
transmission System Security
147.
voting privacy and security
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT