Article thumbnail

Comparison of attack-tolerant network communication architectures.

By Edward L. Platt (6551294) and Daniel M. Romero (6551297)

Abstract

<p>Comparison of attack-tolerant network communication architectures.</p

Topics: Evolutionary Biology, Computational Biology, Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, topological problem, Towards attack, Self-organized networks, address cases, network topology, communication networks, attack-tolerant Structured Multipath Fault Tolerance, transitive trust, butterfly network, Concurrent multipath, network structure, man-in-the-middle attacks, communications infrastructure, wraparound butterfly network topology, topological approaches, butterfly CMR algorithm, trust transitivity, topology-based attack-tolerant communication architectures, attack tolerance, SMFT, non-technical attacks, point-to-point communication network architecture, heavy-tailed degree distributions
Year: 2019
DOI identifier: 10.1371/journal.pone.0214292.t001
OAI identifier: oai:figshare.com:article/7947584
Provided by: FigShare
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • https://figshare.com/articles/... (external link)
  • Suggested articles


    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.