Login / Signup

Identifying security vulnerabilities of weakly detectable network parameter errors.

Yuzhang LinAli Abur
Published in: Allerton (2017)
Keyphrases
  • security vulnerabilities
  • attack graphs
  • dos attacks
  • wireless sensor networks
  • network structure
  • intrusion detection
  • database
  • association rules
  • peer to peer
  • network traffic
  • computer networks
  • network management