Login / Signup

Towards Automation of Vulnerability and Exploitation Identification in IIoT Networks.

Nour MoustafaBenjamin P. TurnbullKim-Kwang Raymond Choo
Published in: ICII (2018)
Keyphrases
  • network structure
  • network design
  • social networks
  • genetic algorithm
  • artificial intelligence
  • website
  • microarray
  • telecommunication networks
  • connectionist networks
  • identification rate