Back to Results
First PageMeta Content
Network protocols / Tunneling protocols / Multiprotocol Label Switching / Border Gateway Protocol / Label switching / Quality of service / Routing / Label Distribution Protocol / MPLS-TP / Network architecture / Computing / Internet standards


Malicious MPLS Policy Engine Reconnaissance A. Almutairi1 and S. Wolthusen1,2 1 Information Security Group Royal Holloway, University of London, UK
Add to Reading List

Document Date: 2013-09-23 18:08:02


Open Document

File Size: 244,29 KB

Share Result on Facebook

Company

Autonomous Systems / S. Wolthusen1 / /

/

Event

FDA Phase / /

Facility

Norwegian Information Security Laboratory Gjøvik University College / University of London / /

IndustryTerm

main signalling protocol / simulation network / Internet Routing Registries / heuristic algorithm / financial services / backbone networks / network operators / /

Organization

Norwegian Information Security Laboratory Gjøvik University College / University of London / /

Product

Is / MPLS / /

Technology

heuristic algorithm / MPLS / exterior Border Gateway Protocol / Simulation / Quality of Service / main signalling protocol / relational database / /

SocialTag