The vulnerability of the military SoS networks under different attack and defense strategies.
Wei-Xin JinPing SongGuo-Zhu LiuPublished in: SOLI (2014)
Keyphrases
- ddos attacks
- attack graphs
- network security
- denial of service
- defense mechanisms
- intrusion detection
- network structure
- computer networks
- buffer overflow
- social networks
- dos attacks
- network design
- security vulnerabilities
- power law
- network analysis
- network size
- command and control
- countermeasures
- risk assessment
- complex systems
- multi agent