Network Obfuscation for Net Worth Security.
Louma ChaddadAli ChehabImad H. ElhajjAyman I. KayssiPublished in: SDS (2020)
Keyphrases
- network model
- peer to peer
- security threats
- enterprise network
- network structure
- malware detection
- denial of service attacks
- security measures
- computer security
- network administrators
- reverse engineering
- buffer overflow
- communication networks
- information security
- complex networks
- access control
- network management
- computer networks
- network access
- network monitoring
- network services
- fault injection
- social networks
- security protection
- forensic analysis
- security management
- application level
- static analysis
- security issues
- security policies
- network security
- wireless sensor networks