Login / Signup
Impersonation Attack-Defense Tree.
Yusep Rosmansyah
Ignatius Leo Sri Hendarto
Demby Pratama
Published in:
iJET (2020)
Keyphrases
</>
block cipher
tree structure
security analysis
smart card
authentication protocol
tree models
defense mechanisms
search algorithm
multi dimensional
binary tree
wireless sensor networks
network security
countermeasures
tree search
tree construction