Login / Signup
Network Security Analysis Using Behavior History Graph.
Mirko Sailio
Matti Mantere
Sami Noponen
Published in:
ARES (2014)
Keyphrases
</>
security analysis
high security
security requirements
public key
authentication protocol
databases
wireless sensor networks
peer to peer
authentication scheme
encryption scheme