Login / Signup

Reconciliation engine and metric for network vulnerability assessment.

Hiran V. NathK. GangadharanM. Sethumadhavan
Published in: SECURIT (2012)
Keyphrases
  • buffer overflow
  • wireless sensor networks
  • network structure
  • network model
  • network topologies
  • peer to peer
  • complex networks
  • network traffic
  • communication networks
  • risk assessment
  • network configuration