Login / Signup

Towards Autonomic Minimization of Security Vulnerabilities Exploitation in Hybrid Network Environments.

Rui Costa CardosoMário M. Freire
Published in: ICAS/ICNS (2005)
Keyphrases
  • security vulnerabilities
  • dos attacks
  • attack graphs
  • network structure
  • computer networks
  • attack graph
  • wireless sensor networks
  • network traffic
  • real world
  • information systems
  • third party
  • unauthorized access