Effective measurement of network vulnerability under random and intentional attacks.
Regino CriadoJulio FloresBenito Hernández-BermejoJavier PelloMiguel RomancePublished in: J. Math. Model. Algorithms (2005)
Keyphrases
- buffer overflow
- traffic analysis
- network traffic
- network model
- wireless sensor networks
- attack graphs
- security risks
- network structure
- network anomaly detection
- denial of service
- security threats
- measurement data
- network architecture
- security problems
- dos attacks
- countermeasures
- network security
- network intrusion
- network attacks
- communication networks
- community structure
- computer networks
- intrusion prevention