Login / Signup

Using Network Tainting to Bound the Scope of Network Ingress Attacks.

Peter MellRichard E. Harang
Published in: SERE (2014)
Keyphrases
  • network structure
  • computer networks
  • real time
  • neural network
  • peer to peer
  • network traffic
  • communication networks
  • network model
  • network architecture
  • traffic analysis
  • data sets
  • upper bound
  • network management