Login / Signup
Towards Autonomic Minimization of Security Vulnerabilities Exploitation in Hybrid Network Environments.
Rui Costa Cardoso
Mário M. Freire
Published in:
ICAS/ICNS (2005)
Keyphrases
</>
security vulnerabilities
dos attacks
attack graphs
network structure
computer networks
attack graph
wireless sensor networks
network traffic
real world
information systems
third party
unauthorized access