Login / Signup
Vulnerability analysis for distributed and coordinated destabilization attacks.
Vasu Chetty
Nathan Woodbury
Elham Vaziripour
Sean Warnick
Published in:
CDC (2014)
Keyphrases
</>
multi agent
cooperative
distributed systems
countermeasures
data sets
fault tolerant
genetic algorithm
email
peer to peer
distributed environment
computer networks
communication overhead
security protocols
denial of service attacks
malicious attacks