Title
Intrinsically Secure Next-Generation Networks.
Abstract
The proliferation of mobile devices, the shift towards cloud computing, and the increased use of information technology in critical infrastructures have opened new attack vectors and risks. Cyber attacks are becoming more sophisticated and persistent, challenging traditional security practices. The impacts of these attacks include expensive data breaches, compromised or stolen records, and loss of...
Year
DOI
Venue
2012
10.1002/bltj.21556
Bell Labs Technical Journal
Field
DocType
Volume
Next-generation network,Computer security,Information technology,Computer network,Mobile device,Intellectual property,Data breach,Engineering,Cloud computing
Journal
17
Issue
ISSN
Citations 
3
1089-7089
0
PageRank 
References 
Authors
0.34
0
4
Name
Order
Citations
PageRank
Suhasini V. Sabnis161.57
Marc Verbruggen200.34
john s hickey310.93
Alan J. Mcbride451.60