Research on A Vulnerability Detection Technology for Network Topology Security.
Jianxin JiChunli XiaTong ZhangYichuan WangSheng LiuPublished in: NaNA (2021)
Keyphrases
- network topology
- network structure
- ad hoc networks
- routing protocol
- access control
- risk assessment
- protein protein interactions
- security vulnerabilities
- information security
- network topologies
- key management
- buffer overflow
- overlay network
- wireless sensor networks
- energy conservation
- end to end
- intrusion detection
- security policies
- anomaly detection
- sensor networks
- security requirements
- centrality measures
- qos routing
- information flow
- security protocols
- real time
- shortest path
- data streams