Author :
Courtney, Martin ; Hunter, Philip ; Hayes, J.
Abstract :
Router vendors are rapidly responding to the fact that hackers are turning their dastardly attentions to the internetworking devices that manage the Internet´s data traffic flow.
Keywords :
Internet; computer crime; computer network security; telecommunication network routing; Internet data traffic flow; computer network security; hackers; internetworking devices; router vendors;
Journal_Title :
Engineering & Technology
DOI :
10.1049/et.2014.0520