But is it exploitable? Exploring how Router Vendors Manage and Patch Security Vulnerabilities in Consumer-Grade Routers.
George ChalhoubAndrew MartinPublished in: EuroUSEC (2023)
Keyphrases
- security vulnerabilities
- end to end
- network layer
- ip networks
- intrusion detection
- ip address
- penetration testing
- dos attacks
- packet forwarding
- ddos attacks
- security properties
- intrusion detection system
- network traffic
- unauthorized access
- end users
- computer networks
- ad hoc networks
- database
- network security
- database management systems
- attack graphs