Login / Signup
Vulnerabilities of network control protocols: an example.
Eric C. Rosen
Published in:
ACM SIGSOFT Softw. Eng. Notes (1981)
Keyphrases
</>
complex networks
control system
network model
application level
network traffic
computer networks
network structure
communication networks
control strategy
wireless sensor networks
information security
communication protocol
switched networks
network protocols
attack graphs