Login / Signup
Measures of Network Vulnerability.
Yehuda Vardi
Cun-Hui Zhang
Published in:
IEEE Signal Process. Lett. (2007)
Keyphrases
</>
network structure
network model
peer to peer
databases
wireless sensor networks
network architecture
machine learning
search engine
computer networks
communication networks
data flow
network design
mobile communication
network topologies
network size
attack graphs