Login / Signup
Cyber-Threat Propagation over Network-Slicing Architectures.
Michele Cirillo
Mario Di Mauro
Vincenzo Matta
Giuseppe Basileo
Published in:
ICASSP (2022)
Keyphrases
</>
peer to peer
computer networks
wireless sensor networks
cyber crime
network structure
network traffic
network model
real time
data mining
artificial neural networks
communication networks
data flow
insider threat