Revisiting the power of reinsertion for optimal targets of network attack.
Changjun FanLi ZengYanghe FengBaoxin XiuJincai HuangZhong LiuPublished in: J. Cloud Comput. (2020)
Keyphrases
- network structure
- network model
- power consumption
- ddos attacks
- optimal solution
- dynamic programming
- worst case
- complex networks
- network architecture
- network intrusion
- end to end
- computer networks
- network nodes
- attack graphs
- fault injection
- attack graph
- network configuration
- optimal strategy
- target detection
- countermeasures