Login / Signup
Evaluating Deception and Moving Target Defense with Network Attack Simulation.
Daniel Reti
Karina Elzer
Daniel Fraunholz
Daniel Schneider
Hans Dieter Schotten
Published in:
CoRR (2023)
Keyphrases
</>
moving target defense
network simulator
simulation model
complex networks
network topologies
attack graphs
network structure
communication networks
countermeasures
network management
secret key
dos attacks
cyber attacks
network intrusion