Sign in

Gramian-based Characterization of Network Vulnerability to Nodal Impulse Inputs.

Prasad Vilas ChanekarBala Kameshwar PoollaJorge Cortés
Published in: ACC (2023)
Keyphrases
  • network structure
  • database
  • computer networks
  • buffer overflow
  • network model
  • network architecture
  • real time
  • bayesian networks
  • wireless sensor networks
  • response time
  • network traffic
  • network parameters
  • attack graphs