Login / Signup
Functionality Meets Terminology to Address Network Security Vulnerabilities.
Greg Goth
Published in:
IEEE Distributed Syst. Online (2006)
Keyphrases
</>
security vulnerabilities
dos attacks
computer networks
peer to peer
attack graphs
wireless sensor networks
low cost
database systems
lightweight