Attack graph - Based vulnerability assessment of rank property in RPL-6LOWPAN in IoT.
Rashmi SahayG. GeethakumariKoushik ModuguPublished in: WF-IoT (2018)
Keyphrases
- attack graphs
- risk assessment
- denial of service
- buffer overflow
- dos attacks
- management system
- penetration testing
- cloud computing
- security vulnerabilities
- attack graph
- low rate
- denial of service attacks
- security problems
- neural network
- graph theoretic
- countermeasures
- big data
- semi supervised
- security risks
- cyber attacks
- mobile computing
- malicious users
- highly ranked
- data corruption
- recommender systems