K van Hove, J van der Ham-de Vos… - … Threats: Research and …, 2023 - dl.acm.org
The Resource Public Key Infrastucture (RPKI) has been created to solve security shortcomings of the Border Gateway Protocol (BGP). This creates an infrastructure where …
N Umeda, T Kimura, N Yanai - IEEE Open Journal of the …, 2023 - ieeexplore.ieee.org
BGP, the de-facto standard protocol for exchanging routes on a network-wide basis called AS employs invalid routes. Recently, a data object called Autonomous System Provider …
NR Jaffri - Journal of Computing and Artificial Intelligence, 2023 - brainetwork.org
Data protection, information security and system security are often referred to as cyber security. So if you do some security research in general, you're likely to see these words very …