Login / Signup
A vulnerability taxonomy for network protocols: Corresponding engineering best practice countermeasures.
Venkat Pothamsetty
Bora A. Akyol
Published in:
Communications, Internet, and Information Technology (2004)
Keyphrases
</>
countermeasures
network protocols
information security
smart grid
power analysis
artificial intelligence
wireless mesh networks
cyber attacks
software engineering
security measures
machine learning
distributed databases