Sign in

Cyber-Threat Propagation over Network-Slicing Architectures.

Michele CirilloMario Di MauroVincenzo MattaGiuseppe Basileo
Published in: ICASSP (2022)
Keyphrases
  • peer to peer
  • computer networks
  • wireless sensor networks
  • cyber crime
  • network structure
  • network traffic
  • network model
  • real time
  • data mining
  • artificial neural networks
  • communication networks
  • data flow
  • insider threat