Login / Signup
Industrial Network Attack Vulnerability Detection and Analysis using Shodan Eye Scanning Technology.
Ebuka Chinaechetam Nkoro
Cosmas Ifeanyi Nwakanma
Jae-Min Lee
Dong-Seong Kim
Published in:
ICTC (2022)
Keyphrases
</>
technology transfer
industrial applications
attack graphs
real time
case study
false positives
eye tracking
neural network
wireless sensor networks
peer to peer
network structure
forensic analysis
network attacks