LSA: Understanding the Threat of Link-Based Scapegoating Attack in Network Tomography.
Xiaojia XuYongcai WangLanling XuDeying LiPublished in: IEEE Trans. Netw. Sci. Eng. (2023)
Keyphrases
- countermeasures
- neural network
- image reconstruction
- network management
- network model
- wireless sensor networks
- buffer overflow
- network configuration
- computer networks
- ranking algorithm
- network traffic
- complex networks
- communication networks
- ddos attacks
- dos attacks
- denial of service attacks
- network structure
- attack graph
- peer to peer
- attack graphs