Public Telephone Network Vulnerabilities.
G. LorenzJ. KellerGavin ManesJohn HaleSujeet ShenoiPublished in: DBSec (2001)
Keyphrases
- peer to peer
- network parameters
- computer networks
- information security
- attack graphs
- data sets
- network administrators
- network configuration
- network management
- network model
- wireless sensor networks
- information systems
- network traffic
- complex networks
- network structure
- computer systems
- data flow
- queueing networks
- network resources
- network size
- artificial neural networks
- case study
- buffer overflow
- neural network