Login / Signup
Network Scanning and Mapping for IIoT Edge Node Device Security.
Matthias Niedermaier
Florian Fischer
Dominik Merli
Georg Sigl
Published in:
CoRR (2019)
Keyphrases
</>
virtual private network
malicious nodes
security threats
wireless sensor networks
remote server
hidden nodes
overlapping communities
security measures
network nodes
centrality measures
cyber attacks
application level
path length
network management
network traffic
network services
network layer
edge information
neighboring nodes
computer networks
security protection
network connection
finding the shortest path
enterprise network
internet service providers
intermediate nodes
communication networks
information security
peer to peer