A quantitative study of two attacks
From MaRDI portal
Publication:2849572
Recommendations
Cited in
(6)- Measuring security in IoT communications
- There are two sides to every question. Controller versus attacker
- Performance evaluation of security protocols specified in LySa
- Signal-flow-based analysis of wireless security protocols
- A Method for Estimation of the Success Probability of an Intrusion Process by Considering the Temporal Aspects of the Attacker Behavior
- Discovering, quantifying, and displaying attacks
This page was built for publication: A quantitative study of two attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2849572)