Cyber Network Resilience against Self-Propagating Malware Attacks.
Alesia ChernikovaNicolò GozziSimona BoboilaPriyanka AngadiJohn LoughnerMatthew WildenNicola PerraTina Eliassi-RadAlina OpreaPublished in: CoRR (2022)
Keyphrases
- traffic analysis
- network anomaly detection
- security threats
- network attacks
- network structure
- attack scenarios
- communication networks
- network security
- detect malicious
- missing data
- computer networks
- fault injection
- peer to peer
- network intrusion
- network configuration
- dos attacks
- security risks
- cyber attacks
- cyber security
- network traffic
- intrusion detection system
- complex networks
- computer systems