Can Adversarial Network Attack be Defended?
Jinyin ChenYangyang WuXiang LinQi XuanPublished in: CoRR (2019)
Keyphrases
- wireless sensor networks
- network model
- network structure
- complex networks
- attack graph
- multi agent
- communication networks
- attack graphs
- network intrusion
- distributed network
- ddos attacks
- network traffic
- real time
- network topologies
- computer networks
- denial of service attacks
- network configuration
- information systems
- learning algorithm