Login / Signup

Industrial Network Attack Vulnerability Detection and Analysis using Shodan Eye Scanning Technology.

Ebuka Chinaechetam NkoroCosmas Ifeanyi NwakanmaJae-Min LeeDong-Seong Kim
Published in: ICTC (2022)
Keyphrases
  • technology transfer
  • industrial applications
  • attack graphs
  • real time
  • case study
  • false positives
  • eye tracking
  • neural network
  • wireless sensor networks
  • peer to peer
  • network structure
  • forensic analysis
  • network attacks