Pseudo-Separation for Assessment of Structural Vulnerability of a Network.
Alan KuhnleTianyi PanVictoria G. CrawfordMd Abdul AlimMy T. ThaiPublished in: CoRR (2017)
Keyphrases
- network model
- peer to peer
- database
- risk assessment
- network structure
- computer networks
- network resources
- network size
- quality assessment
- structural information
- complex networks
- wireless sensor networks
- denial of service
- artificial intelligence
- situation assessment
- network parameters
- buffer overflow
- structural analysis
- structural features
- network management
- network security
- communication networks
- decision making
- genetic algorithm