Login / Signup
Targeted Attack through Network Fingerprinting.
Emeline Marechal
Benoit Donnet
Published in:
J. Cyber Secur. Mobil. (2021)
Keyphrases
</>
attack graphs
ddos attacks
attack graph
network intrusion
denial of service attacks
network architecture
neural network
network management
network design
data sets
cyber attacks
network model
data transfer
dos attacks
network nodes
trust relationships
communication networks
wireless sensor networks
fault injection