Login / Signup
Identifying security vulnerabilities of weakly detectable network parameter errors.
Yuzhang Lin
Ali Abur
Published in:
Allerton (2017)
Keyphrases
</>
security vulnerabilities
attack graphs
dos attacks
wireless sensor networks
network structure
intrusion detection
database
association rules
peer to peer
network traffic
computer networks
network management