A quantitative study of two attacks
From MaRDI portal
Publication:2849572
zbMATH Open1272.68049MaRDI QIDQ2849572FDOQ2849572
Authors: Chiara Bodei, Michele Curti, Pierpaolo Degano, Corrado Priami
Publication date: 20 September 2013
Full work available at URL: http://www.sciencedirect.com/science/article/pii/S1571066105000253
Recommendations
Cited In (6)
- Measuring security in IoT communications
- A Method for Estimation of the Success Probability of an Intrusion Process by Considering the Temporal Aspects of the Attacker Behavior
- Performance evaluation of security protocols specified in LySa
- Discovering, quantifying, and displaying attacks
- There are two sides to every question. Controller versus attacker
- Signal-flow-based analysis of wireless security protocols
This page was built for publication: A quantitative study of two attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2849572)