Dealing with well-formed and malformed packets, associated with point of failure that cause network security breach
T It is quite challenging to understand the weakest single points of failure in a network because it is the point where an entire network system can be taken down. The paths leading to a point of failure, and the status of packets that causes network security breaches were examined by Intent-Based...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English English English |
Published: |
IEEE
2020
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/84606/1/Published.pdf http://irep.iium.edu.my/84606/7/84606_Dealing%20With%20Well-Formed%20and%20Malformed%20Packets_Scopus.pdf http://irep.iium.edu.my/84606/8/84606_Dealing%20With%20Well-Formed%20and%20Malformed%20Packets_WOS.pdf http://irep.iium.edu.my/84606/ https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9241700 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Islam Antarabangsa Malaysia |
Language: | English English English |
Internet
http://irep.iium.edu.my/84606/1/Published.pdfhttp://irep.iium.edu.my/84606/7/84606_Dealing%20With%20Well-Formed%20and%20Malformed%20Packets_Scopus.pdf
http://irep.iium.edu.my/84606/8/84606_Dealing%20With%20Well-Formed%20and%20Malformed%20Packets_WOS.pdf
http://irep.iium.edu.my/84606/
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9241700