Login / Signup
Research of Network Vulnerability Analysis Based on Attack Capability Transfer.
Yong Wang
Xiao-chun Yun
Yongzheng Zhang
Shuyuan Jin
Yanchen Qiao
Published in:
CIT (2012)
Keyphrases
</>
network structure
complex networks
computer networks
network model
ddos attacks
peer to peer
communication networks
attack graphs
network anomaly detection
malicious users
cyber attacks
data transfer
network design
data sets
network traffic
response time
genetic algorithm