Simulation Analysis of DoS, MITM and CDP Security Attacks and Countermeasures.
Biljana TanceskaMitko BogdanoskiAleksandar RisteskiPublished in: FABULOUS (2015)
Keyphrases
- countermeasures
- information security
- security measures
- java card
- cyber attacks
- security breaches
- security issues
- computer security
- information systems
- power analysis
- rural areas
- differential power analysis
- security threats
- cryptographic protocols
- security mechanisms
- static analysis
- security requirements
- smart card
- association rules
- data analysis