Login / Signup
Simulating network cyber attacks using splitting techniques.
Denise M. Bevilacqua Masi
Martin J. Fischer
John F. Shortle
Chun-Hung Chen
Published in:
WSC (2011)
Keyphrases
</>
cyber attacks
cyber security
countermeasures
intrusion detection system
critical infrastructure
security policies
intrusion detection
network structure
computer networks
peer to peer
complex networks
network management
wireless sensor networks
computer systems
dos attacks