Login / Signup
Vulnerabilities of network OS and mitigation with state-based permission system.
Jiseong Noh
Seunghyeon Lee
Jaehyun Park
Seungwon Shin
Brent ByungHoon Kang
Published in:
Secur. Commun. Networks (2016)
Keyphrases
</>
open source
security risks
operating system
network topologies
network model
dos attacks
attack graphs
real time
attack graph
denial of service
state information
network management
virtual machine
network traffic
state space
wireless sensor networks
database systems
data sets