Login / Signup
Patrol: Revealing Zero-Day Attack Paths through Network-Wide System Object Dependencies.
Jun Dai
Xiaoyan Sun
Peng Liu
Published in:
ESORICS (2013)
Keyphrases
</>
wide range
complex objects
wireless sensor networks
computer networks
attack graphs
object tracking
d objects
moving objects
object model
optimal path
cyber attacks
image sequences
complex networks
data model
routing algorithm
network security
network model
ddos attacks
path selection
multiple paths