Using Description Logics for Man in the Middle Attack Analysis

Abstract

The emerging size and complexity of computer networks and also various services provided by them makes the networks vulnerable to numerous attacks. Although in the last few years a more logical approach to TCP/IP network security problem has been followed, a complete and sound formal approach to this problem is lacking. In this paper, we propose using… (More)

Topics

1 Figure or Table

Slides referencing similar topics