Security index based on perfectly undetectable attacks: Graph-theoretic conditions.
Sebin GracyJezdimir MilosevicHenrik SandbergPublished in: Autom. (2021)
Keyphrases
- graph theoretic
- security threats
- security problems
- security mechanisms
- computer security
- security protocols
- security vulnerabilities
- security issues
- denial of service attacks
- security measures
- information security
- cyber attacks
- countermeasures
- fault injection
- java card
- security risks
- secure routing
- chosen plaintext
- security breaches
- security flaws
- security policies
- stream cipher
- random graphs
- graph theory
- hamiltonian path
- malicious users
- access control
- cryptographic protocols
- intrusion detection
- graph properties
- bayesian network structure learning
- buffer overflow
- biometric template
- identity theft
- intrusion detection and prevention
- smart card
- network security
- maximal cliques
- maximum independent set
- genetic algorithm
- dos attacks
- directed graph
- optimal solution