Login / Signup
Modeling Active Cyber Attack for Network Vulnerability Assessment.
Jung-Ho Eom
Young-Ju Han
Tai-Myoung Chung
Published in:
ISPA Workshops (2006)
Keyphrases
</>
cyber attacks
cyber security
risk assessment
peer to peer
data mining
network structure
complex networks
wireless sensor networks
cyber defense
attack detection
critical infrastructure
countermeasures
computer networks
intrusion detection
communication networks
dos attacks
cloud computing