Network Vulnerability Assessment Using Critical Nodes Identification.
Mohammed LalouHamamache KheddouciPublished in: ISNCC (2023)
Keyphrases
- network structure
- centrality measures
- network topologies
- real world networks
- complex networks
- fully connected
- bandwidth usage
- information networks
- intermediate nodes
- network connectivity
- wireless ad hoc networks
- distributed network
- scale free networks
- communication networks
- sparsely connected
- unstructured peer to peer
- neighboring nodes
- neural network
- wireless sensor networks
- hidden nodes
- network layer
- network nodes
- mobile nodes
- risk assessment
- origin destination
- network model
- graph structure
- flow network
- computer networks
- attack graphs
- shortest path
- mesh network