Vulnerabilities of network control protocols: an example.
Eric C. RosenPublished in: Comput. Commun. Rev. (1981)
Keyphrases
- peer to peer
- distributed control
- control system
- network administrators
- network protocols
- control strategy
- network model
- communication protocol
- electric vehicles
- attack graphs
- delay tolerant
- buffer overflow
- networked control systems
- security risks
- control method
- communication networks
- network traffic
- network structure
- lightweight
- wireless sensor networks