Login / Signup
Vulnerability of Interdependent Infrastructures Under Random Attacks.
Hana Khamfroush
Samuel Lofumbwa Iloo
Mahshid Rahnamay-Naeini
Published in:
SIGMETRICS Perform. Evaluation Rev. (2018)
Keyphrases
</>
chosen plaintext
buffer overflow
denial of service
dos attacks
data management
countermeasures
traffic analysis
security vulnerabilities
security risks
network security
attack graphs
security protocols
malicious attacks
neural network
watermarking scheme
malicious users
information systems
learning algorithm