2019
DOI: 10.1007/978-981-13-5826-5_1
|View full text |Cite
|
Sign up to set email alerts
|

A Graph-Based Decision Support Model for Vulnerability Analysis in IoT Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 31 publications
0
3
0
Order By: Relevance
“…Assuming the Weibull state transition time, the nonzero elements of K(t) are given in (8) to (14). 62 Wolfram mathematics and MATLAB are used to calculate the complex integrals involved. )…”
Section: Trojan Attackmentioning
confidence: 99%
See 2 more Smart Citations
“…Assuming the Weibull state transition time, the nonzero elements of K(t) are given in (8) to (14). 62 Wolfram mathematics and MATLAB are used to calculate the complex integrals involved. )…”
Section: Trojan Attackmentioning
confidence: 99%
“…In general, the risk is referred to as the potential for damage, loss, or destruction of an asset due to some threat exploiting system vulnerabilities . Vulnerabilities associated with computer‐based systems are the main threats to the network security . With a proper quantitative analysis of the security, the system survivability may be effectively enhanced, thereby promoting the response to unexpected security attacks to complex networks and systems.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation