Modelling Malicious Potential: A Prototype of a Preemptive Strategy for Mitigating Attacks on London's Bus Network.
Toby Staton-BevanCharles ClarkePublished in: CyberSA (2021)
Keyphrases
- insider threat
- malicious traffic
- traffic analysis
- security risks
- malicious attacks
- network traffic
- detect malicious
- normal traffic
- network anomaly detection
- complex networks
- malicious users
- security threats
- network structure
- high speed
- malicious code
- malicious nodes
- insider attacks
- scheduling problem
- network attacks
- fault injection
- malicious behavior
- peer to peer
- wireless sensor networks
- ddos attacks
- communication networks
- neural network
- network intrusion
- anomaly detection
- network topologies
- network intrusion detection
- computer networks