I
nte
rna
t
io
na
l J
o
urna
l o
f
E
lect
rica
l a
nd
Co
m
p
ute
r
E
ng
in
ee
ring
(
I
J
E
CE
)
Vo
l.
10
,
No
.
6
,
Dec
em
b
er
2
0
2
0
,
p
p
.
6
0
3
9
~
6
0
4
4
I
SS
N:
2
0
8
8
-
8708
,
DOI
: 1
0
.
1
1
5
9
1
/
i
j
ec
e
.
v
1
0
i
6
.
pp
6
0
3
9
-
6
0
4
4
6039
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ij
ec
e.
ia
esco
r
e.
co
m/in
d
ex
.
p
h
p
/I
JE
C
E
A
r
is
k
and
s
ecuri
t
y
a
ss
ess
m
ent
of V
ANET
av
a
ila
bility
using
a
tt
a
c
k
t
ree
c
o
ncept
M
er
iem
H
o
u
m
er
,
M
o
ula
y
L
a
hcen
H
a
s
na
o
ui
In
f
o
rm
a
ti
o
n
a
n
d
Co
m
m
u
n
ica
ti
o
n
S
y
st
e
m
s E
n
g
in
e
e
rin
g
Re
se
a
r
c
h
Tea
m
,
M
a
th
e
m
a
ti
c
a
l
M
o
d
e
li
n
g
a
n
d
C
o
m
p
u
ter S
c
ien
c
e
L
a
b
o
ra
to
ry
,
Na
ti
o
n
a
l
G
ra
d
u
a
te S
c
h
o
o
l
o
f
A
rts
a
n
d
Cra
f
ts,
M
o
u
lay
-
Is
m
a
il
Un
iv
e
rsit
y
,
M
o
ro
c
c
o
Art
icle
I
nfo
AB
ST
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
Mar
16
,
2
0
20
R
ev
i
s
ed
Ma
y
11
,
2020
A
cc
ep
ted
Ma
y
23
,
2
0
2
0
T
h
e
c
h
a
ll
e
n
g
in
g
n
a
tu
re
o
f
in
se
c
u
re
w
irele
ss
c
h
a
n
n
e
ls
a
n
d
th
e
o
p
e
n
-
a
c
c
e
ss
e
n
v
iro
n
m
e
n
t
m
a
k
e
th
e
p
ro
tec
ti
o
n
o
f
v
e
h
icu
lar
a
d
h
o
c
n
e
tw
o
rk
(V
A
NET
)
a
p
a
rti
c
u
larly
c
rit
ica
l
issu
e
.
Ro
b
u
st
a
p
p
r
o
a
c
h
e
s
to
p
ro
tec
t
th
is
n
e
tw
o
rk
'
s
se
c
u
rit
y
a
n
d
p
riv
a
c
y
a
g
a
in
st attac
k
s n
e
e
d
to
b
e
im
p
ro
v
e
d
,
try
in
g
to
a
c
h
iev
e
a
n
a
d
e
q
u
a
te
lev
e
l,
to
se
c
u
re
th
e
c
o
n
f
id
e
n
ti
a
l
in
f
o
rm
a
ti
o
n
o
f
d
riv
e
rs
a
n
d
p
a
ss
e
n
g
e
rs.
Ac
c
o
rd
in
g
ly
,
to
im
p
ro
v
e
th
e
se
c
u
rit
y
o
f
V
A
NE
T
,
it
is
n
e
c
e
ss
a
r
y
to
c
a
rry
o
u
t
a
risk
a
ss
e
s
s
m
e
n
t,
in
o
r
d
e
r
to
e
v
a
lu
a
te
th
e
risk
th
i
s
n
e
t
w
o
r
k
is
f
a
c
in
g
.
T
h
is
p
a
p
e
r
f
o
c
u
se
s
o
n
th
e
se
c
u
rit
y
th
re
a
ts
in
V
A
NE
T
,
p
a
rti
c
u
larl
y
o
n
t
h
e
a
v
a
il
a
b
il
it
y
o
f
th
is
n
e
two
rk
.
W
e
p
ro
p
o
se
a
n
o
v
e
l
risk
a
ss
e
ss
m
e
n
t
a
p
p
ro
a
c
h
t
o
e
v
a
lu
a
te
th
e
risk
o
f
th
e
a
tt
a
c
k
a
g
a
in
st
V
A
NE
T
a
v
a
il
a
b
il
it
y
.
W
e
a
d
o
p
t
a
tree
stru
c
tu
re
c
a
l
led
a
tt
a
c
k
-
tree
to
m
o
d
e
l
th
e
a
tt
a
c
k
e
r
'
s
p
o
ten
ti
a
l
a
tt
a
c
k
stra
te
g
ies
.
Ba
se
d
o
n
t
h
is
a
tt
a
c
k
-
tree
,
w
e
c
a
n
e
stim
a
te
th
e
p
ro
b
a
b
il
it
y
th
a
t
a
sp
e
c
if
ic
m
e
n
a
c
e
m
i
g
h
t
lea
d
a
g
a
in
st
V
A
NET
a
n
d
d
e
tec
t
p
o
te
n
ti
a
l
a
tt
a
c
k
se
q
u
e
n
c
e
s
th
a
t
a
n
a
tt
a
c
k
e
r
c
o
u
ld
lau
n
c
h
a
g
a
in
st
V
A
NE
T
a
v
a
il
a
b
il
it
y
.
T
h
e
n
,
w
e
u
ti
li
z
e
th
e
u
ti
li
ty
m
u
lt
i
-
a
tt
rib
u
te
th
e
o
ry
to
m
e
a
su
re
th
e
to
tal
risk
v
a
lu
e
o
f
th
e
sy
ste
m
,
in
c
lu
d
in
g
t
h
e
p
ro
b
a
b
il
i
ti
e
s
o
f
e
a
c
h
se
q
u
e
n
c
e
o
f
a
tt
a
c
k
.
T
h
e
a
n
a
l
y
sis
re
su
lt
s
o
f
th
e
stu
d
y
w
il
l
h
e
lp
d
e
c
isio
n
-
m
a
k
e
rs
tak
e
e
ff
e
c
ti
v
e
p
re
c
a
u
ti
o
n
s
to
p
re
v
e
n
t
a
tt
a
c
k
o
n
t
h
is n
e
tw
o
rk
’s av
a
il
a
b
il
it
y
.
K
ey
w
o
r
d
s
:
A
ttac
k
-
t
r
ee
Av
ailab
ilit
y
R
is
k
as
s
ess
m
e
n
t
Secu
r
it
y
VANE
T
Co
p
y
rig
h
t
©
2
0
2
0
In
stit
u
te o
f
A
d
v
a
n
c
e
d
E
n
g
i
n
e
e
rin
g
a
n
d
S
c
ien
c
e
.
Al
l
rig
h
ts re
se
rv
e
d
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
Me
r
ie
m
Ho
u
m
er
,
I
n
f
o
r
m
a
tio
n
a
n
d
C
o
m
m
u
n
ica
ti
o
n
S
y
s
te
m
s
E
n
g
i
n
ee
r
in
g
R
ese
ar
ch
T
ea
m
,
Ma
th
e
m
atica
l M
o
d
elin
g
a
n
d
C
o
m
p
u
ter
Scie
n
ce
L
ab
o
r
ato
r
y
,
Natio
n
al
Gr
ad
u
ate
Sc
h
o
o
l o
f
A
r
t
s
an
d
C
r
a
f
ts
,
Mo
u
la
y
-
I
s
m
ai
l U
n
i
v
er
s
it
y
,
Me
k
n
es,
Mo
r
o
cc
o
E
m
ail:
h
o
u
m
er
.
m
@
g
m
a
il.c
o
m
1.
I
NT
RO
D
UCT
I
O
N
T
h
e
tech
n
o
lo
g
ical
d
ev
elo
p
m
en
t
h
as
r
ea
ch
ed
all
d
o
m
ain
s
,
esp
ec
iall
y
th
e
co
m
m
u
n
icat
io
n
s
ar
ea
,
w
h
ic
h
is
u
n
d
er
g
o
in
g
m
aj
o
r
ch
an
g
e
s
i
n
w
ir
eles
s
tec
h
n
o
lo
g
y
ad
v
en
t.
T
h
is
tec
h
n
o
lo
g
y
w
as
u
s
ed
b
y
r
esear
c
h
er
s
to
p
er
m
it
v
e
h
icles
to
in
ter
ac
t
w
it
h
ea
ch
o
th
er
,
w
i
th
o
r
w
it
h
o
u
t
in
f
r
astr
u
ctu
r
e
in
s
talle
d
n
ex
t
to
th
e
r
o
ad
,
w
h
ic
h
co
n
s
t
itu
tes t
h
e
n
et
w
o
r
k
s
ca
lled
Veh
ic
u
lar
A
d
-
Ho
c
NE
T
w
o
r
k
(
V
A
NE
T
).
VANE
T
co
n
s
titu
tes
t
h
e
co
r
e
o
f
t
h
e
i
n
telli
g
e
n
t
tr
a
n
s
p
o
r
t
s
y
s
te
m
(
I
T
S)
h
av
i
n
g
a
s
m
ai
n
o
b
j
ec
tiv
e
th
e
i
m
p
r
o
v
e
m
e
n
t
o
f
r
o
ad
s
af
e
t
y
[
1
]
b
y
t
ak
in
g
ad
v
a
n
ta
g
e
o
f
t
h
e
e
m
er
g
e
n
ce
o
f
co
m
m
u
n
icati
o
n
tech
n
o
lo
g
y
a
n
d
th
e
lo
w
er
in
g
o
f
t
h
e
co
s
t
o
f
w
ir
eless
d
ev
ice
s
.
I
n
d
ee
d
,
th
an
k
s
t
o
s
en
s
o
r
s
in
s
talled
i
n
v
e
h
icles,
o
r
lo
ca
ted
n
ex
t
to
th
e
r
o
ad
s
a
n
d
co
n
tr
o
l
ce
n
ter
s
,
v
e
h
icle
co
m
m
u
n
icatio
n
s
w
i
ll
allo
w
d
r
iv
er
s
to
b
e
w
ar
n
e
d
ea
r
l
y
o
f
p
o
s
s
ib
le
d
an
g
er
s
[
2
]
.
I
n
ad
d
itio
n
,
th
e
s
e
n
et
w
o
r
k
s
w
ill
n
o
t
o
n
l
y
i
m
p
r
o
v
e
r
o
ad
s
af
et
y
b
u
t
w
i
ll
also
o
f
f
er
n
e
w
s
er
v
ice
s
to
r
o
ad
u
s
er
s
[
3
]
,
m
a
k
in
g
r
o
ad
u
s
e
m
o
r
e
p
leasa
n
t.
I
n
ter
e
s
tin
g
co
n
tr
ib
u
tio
n
s
r
eg
ar
d
in
g
th
e
ex
c
h
a
n
g
e
o
f
in
f
o
r
m
atio
n
b
et
w
ee
n
v
e
h
icle
s
h
av
e
b
ee
n
p
r
o
p
o
s
ed
r
ec
en
tl
y
i
n
s
e
v
er
al
r
esear
ch
p
r
o
j
ec
ts
r
el
ated
to
r
o
a
d
s
af
et
y
.
T
y
p
icall
y
,
th
e
d
esti
n
atio
n
v
e
h
icle
u
til
izes
th
e
in
f
o
r
m
a
tio
n
s
e
n
t
b
y
th
e
s
o
u
r
ce
v
e
h
icl
e
in
o
r
d
er
to
b
etter
an
al
y
ze
th
e
s
it
u
ati
o
n
s
o
f
th
e
r
o
ad
th
at
ar
is
e.
T
h
is
s
it
u
at
io
n
ca
n
g
i
v
e
r
i
s
e
to
s
ec
u
r
it
y
at
tack
s
b
y
ad
v
er
s
ar
ies.
D
u
e
to
th
e
i
m
p
o
r
tan
ce
o
f
v
eh
icle
-
to
-
v
eh
icle
ex
c
h
an
g
es
a
n
d
o
p
en
in
g
s
o
f
th
e
V
A
NE
T
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
10
,
No
.
6
,
Dec
em
b
er
2
0
2
0
:
6
0
3
9
-
6
0
4
4
6040
en
v
ir
o
n
m
e
n
t,
m
a
n
y
attac
k
er
s
ca
n
s
e
n
d
aler
ti
n
g
m
es
s
ag
e
s
wh
o
s
e
co
n
ten
t
is
f
a
ls
i
f
ied
o
r
p
r
ev
en
t
a
le
g
iti
m
at
e
m
es
s
ag
e
b
ei
n
g
d
eli
v
er
ed
in
o
r
d
er
to
ca
u
s
e
ac
cid
en
ts
[
4
]
.
T
h
e
y
ca
n
p
r
ev
en
t
th
e
r
o
u
t
in
g
o
f
th
ese
m
es
s
ag
e
s
b
y
attac
k
i
n
g
t
h
e
n
e
t
w
o
r
k
av
ai
lab
ilit
y
i
n
o
r
d
er
to
m
ak
e
t
h
is
n
e
t
w
o
r
k
u
n
av
ailab
le,
a
n
d
th
en
i
ts
m
ai
n
g
o
al
w
il
l
b
ec
o
m
e
u
s
ele
s
s
.
Ou
r
r
esear
ch
w
o
r
k
ai
m
s
to
en
s
u
r
e
th
e
v
eh
i
cle
s
y
s
te
m
's
r
eliab
ilit
y
.
I
n
o
r
d
er
to
d
ev
elo
p
co
u
n
ter
m
ea
s
u
r
es
a
g
ai
n
s
t
th
r
ea
t
s
led
b
y
ad
v
er
s
ar
ie
s
,
it
i
s
n
ec
e
s
s
ar
y
t
o
an
al
y
ze
a
n
d
m
i
n
i
m
ize
p
o
s
s
i
b
le
attac
k
s
a
g
ai
n
s
t
th
e
s
y
s
te
m
's
ass
e
ts
.
O
u
r
a
n
al
y
s
i
s
o
f
t
h
e
attac
k
i
s
b
a
s
ed
o
n
a
s
tr
u
ctu
r
e
an
d
d
e
cisi
o
n
tr
ee
ca
lled
th
e
attac
k
-
tr
ee
.
A
cc
o
r
d
in
g
to
t
h
e
attac
k
-
tr
ee
m
eth
o
d
,
w
e
s
u
g
g
est
a
n
e
w
r
is
k
a
s
s
es
s
m
en
t
ap
p
r
o
ac
h
f
o
r
V
A
NE
T
av
ailab
ilit
y
.
A
ttac
k
-
tr
ee
b
ased
r
is
k
a
n
al
y
ze
s
u
s
e
a
tr
ee
-
b
ased
ap
p
r
o
ac
h
to
m
o
d
el
an
d
e
v
al
u
ate
s
y
s
te
m
r
is
k
a
n
d
d
ef
in
e
p
o
s
s
ib
le
attac
k
s
tr
ate
g
ies
t
h
at
th
e
attac
k
er
ca
n
l
ea
d
ag
ain
s
t
t
h
is
s
y
s
te
m
.
U
s
in
g
t
h
i
s
ap
p
r
o
ac
h
,
th
e
ca
p
ac
it
y
o
f
t
h
e
a
ttack
s
o
u
r
ce
ca
n
b
e
an
a
l
y
ze
d
a
n
d
t
h
e
d
eg
r
ee
o
f
th
e
e
f
f
ec
t
s
o
f
attac
k
s
led
a
g
ai
n
s
t
th
e
n
et
w
o
r
k
ca
n
b
e
esti
m
ated
.
T
ak
in
g
ad
v
an
ta
g
e
o
f
th
e
a
ttac
k
-
tr
ee
m
et
h
o
d
,
in
t
h
i
s
p
ap
er
,
w
e
u
s
e
it
to
id
en
ti
f
y
th
e
p
o
s
s
ib
le
th
r
ea
ts
la
u
n
ch
ed
ag
ain
s
t
V
A
NE
T
av
ailab
ilit
y
,
an
d
w
e
m
ea
s
u
r
e
f
u
r
th
er
th
e
o
v
er
all
lik
e
lih
o
o
d
o
f
th
e
attac
k
er
h
i
ttin
g
th
e
tar
g
et
g
o
al.
Fin
all
y
,
th
e
d
ec
is
io
n
-
m
a
k
er
w
il
l
d
ec
id
e
w
h
ic
h
m
ea
s
u
r
es
o
f
p
r
o
tectio
n
w
ill
b
e
im
p
le
m
e
n
ted
b
ased
o
n
th
e
q
u
an
tita
tiv
e
r
es
u
lt.
T
h
e
r
est
o
f
t
h
i
s
p
ap
er
is
s
tr
u
ctu
r
ed
a
s
f
o
llo
w
s
:
Sectio
n
2
p
r
esen
ts
th
e
attac
k
-
tr
ee
f
u
n
d
a
m
e
n
tal
s
.
Sectio
n
3
in
tr
o
d
u
ce
s
th
e
at
ta
ck
-
tr
ee
m
o
d
el
f
o
r
V
A
NE
T
av
ailab
ilit
y
.
T
h
e
r
is
k
as
s
es
s
m
en
t
is
a
n
al
y
ze
d
in
s
ec
tio
n
4
.
Fin
a
ll
y
,
w
e
co
n
c
lu
d
e
in
s
ec
tio
n
5
.
2.
AT
T
ACK
T
R
E
E
F
UN
DAM
E
NT
AL
S
2
.
1
.
Def
ini
t
io
n
B
r
u
ce
Sch
n
eier
[
5
,
6
]
h
as
d
e
s
cr
ib
ed
th
e
attac
k
s
tr
ee
s
as
a
m
o
d
el
o
f
t
h
r
ea
ts
led
a
g
ai
n
s
t
s
y
s
te
m
s
.
I
t
is
an
a
n
al
y
t
ical
tech
n
iq
u
e
in
w
h
ic
h
th
e
s
y
s
te
m
is
a
n
al
y
ze
d
f
r
o
m
t
h
e
attac
k
er
's
p
o
in
t
o
f
v
i
e
w
i
n
o
r
d
er
to
f
in
d
all
cr
ed
ib
le
w
a
y
s
i
n
w
h
ic
h
th
e
attac
k
e
v
e
n
t
ca
n
o
cc
u
r
.
Ho
w
e
v
er
,
w
h
en
w
e
co
n
s
id
er
all
t
h
e
d
if
f
er
e
n
t
tech
n
iq
u
es
i
n
w
h
ic
h
a
s
y
s
te
m
m
a
y
b
e
attac
k
ed
,
w
e
w
i
ll
p
o
s
s
ib
l
y
estab
li
s
h
t
h
e
s
a
f
es
t
co
u
n
te
r
m
ea
s
u
r
es
to
av
o
id
s
u
c
h
attac
k
s
.
A
tt
ac
k
tr
ee
s
ar
e
u
s
ed
in
a
v
ar
iet
y
o
f
co
n
tex
ts
,
s
u
c
h
as
s
a
f
et
y
an
d
ae
r
o
s
p
ac
e,
in
o
r
d
er
to
an
aly
ze
an
d
ev
al
u
ate
attac
k
s
ag
ai
n
s
t
th
e
ta
m
p
er
-
r
esi
s
ta
n
t
elec
tr
o
n
i
cs
s
y
s
te
m
.
I
n
a
d
d
itio
n
,
th
e
y
h
av
e
b
ee
n
u
s
ed
i
n
th
e
f
ield
o
f
in
f
o
r
m
atio
n
tec
h
n
o
lo
g
y
to
a
n
al
y
ze
attac
k
s
a
g
ain
s
t
s
e
n
s
o
r
s
an
d
co
m
p
u
ter
s
y
s
te
m
s
a
n
d
i
n
ter
p
r
et
th
e
co
n
v
en
ie
n
t
m
et
h
o
d
b
y
w
h
i
ch
an
attac
k
er
ca
n
ca
r
r
y
o
u
t a
s
p
ec
if
ic
attac
k
[
7
]
.
B
asicall
y
,
e
v
er
y
n
o
d
e
i
n
t
h
e
attac
k
-
tr
ee
i
n
d
icate
s
a
p
ar
ticu
lar
th
r
ea
t.
A
t
to
p
o
f
t
h
e
tr
ee
,
w
e
f
in
d
th
e
r
o
o
t
n
o
d
e
w
h
ich
r
ep
r
ese
n
t
s
th
e
g
lo
b
al
o
b
j
ec
tiv
e
o
f
t
h
e
a
ttack
er
.
T
h
e
o
th
er
n
o
d
es
w
h
ic
h
ar
e
t
h
e
lea
v
es
o
f
th
e
tr
ee
r
ep
r
esen
t
s
u
b
-
o
b
j
ec
tiv
es.
Ge
n
er
all
y
,
a
b
in
ar
y
r
el
atio
n
(
also
ca
lled
o
p
er
ato
r
)
is
as
s
o
ciate
d
w
it
h
th
e
in
ter
n
al
n
o
d
es
o
f
th
e
tr
ee
.
T
h
ese
o
p
er
ato
r
s
ca
n
b
e
A
N
D
o
r
OR
.
An
A
ND
o
p
er
ato
r
(
r
esp
ec
tiv
el
y
a
n
O
R
o
p
er
ato
r
)
is
co
n
s
id
er
ed
s
u
cc
ess
f
u
l
w
h
en
all
o
f
its
ch
ild
n
o
d
es
(
r
esp
ec
tiv
el
y
,
at
least
o
n
e)
ar
e
s
u
cc
e
s
s
f
u
l.
T
h
er
e
ar
e
d
if
f
er
en
t
k
in
d
s
o
f
attac
k
tr
ee
s
s
u
c
h
a
s
De
f
e
n
s
e
-
tr
ee
[
8
]
,
P
r
o
tectio
n
-
tr
ee
[9
]
,
A
ttac
k
-
d
e
f
e
n
s
e
tr
ee
s
[
1
0
]
,
an
d
Vu
ln
er
ab
ilit
ie
s
-
T
r
ee
[
1
1
]
.
T
h
ey
h
a
v
e
t
h
e
s
a
m
e
at
tack
-
tr
ee
c
h
ar
ac
ter
is
tic
s
,
f
e
w
asp
ec
ts
w
h
ich
d
is
tin
g
u
is
h
th
e
m
.
2
.
2
.
At
t
a
ck
t
re
e
ba
s
is
An
at
tack
tr
ee
i
s
a
tech
n
i
q
u
e
o
f
ev
al
u
ati
n
g
n
et
w
o
r
k
s
ec
u
r
it
y
ag
ai
n
s
t
it
s
p
r
o
b
ab
le
atta
ck
s
.
Ho
w
e
v
er
,
w
e
u
s
e
an
attac
k
tr
e
e
to
in
ter
p
r
et
attac
k
s
th
at
an
ex
ter
n
al
i
n
tr
u
d
er
o
r
in
s
id
er
attac
k
er
ca
n
g
en
er
ate
i
n
a
co
m
m
u
n
ica
tio
n
s
n
et
w
o
r
k
.
Attack
tr
ee
s
allo
w
u
s
to
m
ea
s
u
r
e
s
ec
u
r
it
y
r
i
s
k
s
th
at
f
ac
e
a
s
y
s
te
m
w
it
h
r
eg
ar
d
to
lo
s
s
es
ca
u
s
ed
b
y
attac
k
s
[
1
2
]
o
r
th
e
b
en
ef
i
t
o
f
d
ef
e
n
d
er
s
t
h
r
o
u
g
h
th
e
u
s
a
g
e
o
f
d
ef
e
n
s
e
s
ec
u
r
it
y
m
ec
h
an
is
m
s
.
T
h
e
an
al
y
s
i
s
o
f
a
n
et
w
o
r
k
o
r
a
s
y
s
te
m
t
h
r
o
u
g
h
th
is
tech
n
iq
u
e
co
n
tr
ib
u
te
s
to
th
e
esti
m
ati
o
n
o
f
a
p
r
o
b
ab
ilis
tic
r
is
k
as
s
es
s
m
e
n
t
o
f
th
e
n
et
w
o
r
k
th
at
f
ac
ili
tates
co
m
m
u
n
ica
tio
n
s
y
s
t
e
m
s
g
r
o
w
t
h
.
I
n
itiall
y
,
th
e
f
u
n
d
a
m
e
n
tal
attac
k
tr
ee
d
o
es n
o
t p
r
o
v
id
e
d
ef
en
s
e
m
ec
h
a
n
is
m
s
.
T
h
e
m
ec
h
an
is
m
u
s
ed
in
co
n
s
t
r
u
ctin
g
t
h
e
attac
k
tr
ee
is
s
tr
u
ctu
r
ed
to
d
ef
in
e
th
e
s
eq
u
en
ce
o
f
ev
en
t
s
lead
in
g
to
th
e
d
ef
i
n
iti
v
e
ev
e
n
t
ch
o
s
en
(
r
o
o
t
n
o
d
e)
.
T
h
e
r
o
o
t
n
o
d
e
in
th
e
tr
ee
r
ep
r
esen
ts
th
e
g
lo
b
al
g
o
al
o
f
th
e
attac
k
er
,
an
d
lea
f
n
o
d
es
r
ep
r
esen
t
th
e
s
u
b
-
g
o
als.
T
h
e
attac
k
g
o
al
m
u
s
t
b
e
ca
r
ef
u
ll
y
s
e
lecte
d
.
I
n
ad
d
itio
n
,
w
e
m
a
y
h
a
v
e
s
e
v
er
al
r
o
o
t
n
o
d
es
r
ef
lecti
n
g
d
i
f
f
er
e
n
t
g
o
als
in
co
m
p
lex
s
y
s
te
m
s
.
No
d
es
ca
n
b
e
co
n
n
ec
ted
,
p
ar
ticu
lar
l
y
,
t
h
r
o
u
g
h
A
ND
a
n
d
OR
B
o
o
lean
op
er
ato
r
s
[
1
3
]
.
T
h
ese
o
p
er
ato
r
s
ar
e
co
n
s
id
er
ed
as
th
e
b
asic
g
ates
to
co
n
s
tr
u
ct
t
h
e
attac
k
tr
ee
.
T
h
e
OR
g
ate
d
escr
ib
es
t
h
e
d
if
f
er
en
t
m
a
n
n
er
s
to
attai
n
th
e
s
a
m
e
g
o
al
(
t
h
e
attac
k
g
o
al
m
a
y
b
e
attai
n
ed
b
y
r
ea
c
h
in
g
t
h
e
f
ir
s
t
OR
t
h
e
s
ec
o
n
d
leaf
n
o
d
es),
w
h
ile
A
ND
g
a
tes
d
ep
ict
th
e
d
if
f
er
e
n
t
w
a
y
s
to
w
ar
d
th
e
s
a
m
e
g
o
al
g
o
al
(
th
e
attac
k
g
o
al
m
a
y
b
e
attain
ed
b
y
r
ea
ch
i
n
g
th
e
f
ir
s
t
A
ND
t
h
e
s
ec
o
n
d
leaf
n
o
d
es).
E
v
en
t
u
all
y
,
d
u
r
in
g
th
e
co
n
s
tr
u
ctio
n
o
f
th
e
attac
k
tr
ee
it
is
i
m
p
o
r
tan
t
to
en
s
u
r
e
t
h
at
t
h
e
s
tr
u
ctu
r
e
is
co
n
s
is
ten
t a
n
d
to
co
m
p
l
y
w
it
h
s
o
m
e
ex
tr
a
r
u
les
w
h
ic
h
ar
e:
-
An
y
e
le
m
e
n
t
f
ail
u
r
e
in
d
u
ce
s
s
y
s
te
m
f
ail
u
r
e.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2
0
8
8
-
8708
A
r
is
k
a
n
d
s
ec
u
r
ity
a
s
s
ess
men
t o
f V
A
N
E
T a
va
ila
b
ilit
y
u
s
in
g
a
tta
ck
tr
ee
co
n
ce
p
t (
Mer
iem
H
o
u
mer)
6041
-
T
h
e
s
u
cc
ess
f
u
l i
m
p
le
m
e
n
tatio
n
o
f
all
it
s
ele
m
e
n
t
s
g
u
ar
an
tee
s
th
at
t
h
e
s
y
s
te
m
o
p
er
ates c
o
r
r
ec
tl
y
.
-
W
h
en
t
h
e
s
y
s
te
m
f
ails
,
t
h
e
s
y
s
te
m
d
o
es n
o
t r
es
u
m
e
s
er
v
ice
d
u
e
to
a
n
o
v
el
attac
k
.
-
I
f
th
e
m
ec
h
an
i
s
m
f
u
n
ctio
n
s
co
r
r
ec
tly
,
ab
d
u
ct
an
at
tack
f
r
o
m
t
h
e
s
y
s
te
m
d
o
es
n
o
t
ca
u
s
e
its
f
ai
lu
r
e.
I
t
ca
n
h
ap
p
en
th
a
t
an
at
tack
o
n
a
n
e
le
m
e
n
t
r
ed
u
ce
s
o
r
r
e
m
o
v
e
th
e
i
m
p
ac
t
o
f
a
n
an
ter
io
r
attac
k
an
d
th
u
s
al
lo
w
th
e
f
u
n
ctio
n
in
g
o
f
t
h
e
s
y
s
te
m
.
-
B
e
s
u
r
e
to
id
en
tify
all
lo
g
ical
g
ate
’
s
i
n
p
u
t e
v
en
t
s
b
ef
o
r
e
d
eter
m
in
in
g
t
h
eir
co
r
r
esp
o
n
d
in
g
c
au
s
e
s
.
-
Av
o
id
lin
k
i
n
g
d
ir
ec
tl
y
t
w
o
lo
g
ical
g
ates.
-
C
h
o
o
s
e
a
n
ter
io
r
ca
u
s
es j
u
s
t b
ef
o
r
e
th
e
ev
e
n
t e
x
is
t
s
.
On
th
e
b
as
is
o
f
t
h
e
ab
o
v
e,
w
e
d
esig
n
ed
v
e
h
ic
u
lar
ad
h
o
c
n
et
w
o
r
k
att
ac
k
tr
ee
m
o
d
el
an
d
s
elec
ted
a
r
an
g
e
o
f
m
aj
o
r
p
r
iv
ac
y
is
s
u
es
as
tar
g
ets
f
o
r
th
e
attac
k
er
.
T
h
e
av
ailab
ilit
y
o
f
v
e
h
ic
u
lar
n
et
w
o
r
k
r
ep
r
esen
t
s
th
e
attac
k
er
's g
o
al
s
[
1
4
]
.
T
h
e
n
ex
t
s
ec
tio
n
i
n
cl
u
d
es a
s
tep
w
i
s
e
an
al
y
s
i
s
f
o
r
b
u
ild
i
n
g
o
u
r
attac
k
tr
ee
.
3.
B
UIL
DI
NG
A
T
T
ACK
T
R
E
E
F
O
R
VANE
T
AVA
I
L
AB
I
L
I
T
Y
I
n
o
r
d
er
to
co
n
s
tr
u
ct
o
u
r
at
tac
k
tr
ee
,
w
e
o
p
t
f
o
r
a
s
tep
-
by
-
s
t
ep
r
ef
in
e
m
e
n
t
m
o
d
el.
Ho
w
e
v
e
r
,
VA
NE
T
av
ailab
ilit
y
is
t
h
e
g
lo
b
al
g
o
al
o
f
th
e
attac
k
er
an
d
th
e
r
o
o
t
n
o
d
e
o
f
o
u
r
attac
k
-
tr
ee
.
T
h
is
g
o
a
l
is
in
d
icate
d
b
y
G
as sh
o
w
n
i
n
Fi
g
u
r
e
1
.
T
h
e
attac
k
tr
ee
co
n
s
tr
u
ctio
n
p
r
o
ce
s
s
i
n
v
o
lv
e
s
th
e
f
o
llo
w
in
g
s
tep
s
:
-
I
d
en
tify
th
e
g
lo
b
al
g
o
al
(
r
o
o
t n
o
d
e)
o
f
th
e
attac
k
er
:
V
ANE
T
a
v
ailab
ilit
y
(
G)
.
-
Div
id
e
t
h
e
g
lo
b
al
g
o
al
"
VA
N
E
T
av
ailab
ilit
y
"
w
ith
in
s
u
b
-
g
o
als.
I
n
o
u
r
ca
s
e,
t
h
er
e
ar
e
t
h
r
ee
leav
e
s
attac
h
ed
to
th
e
r
o
o
t
n
o
d
e:
B
lack
H
o
le
(
S1
)
[
1
5
]
,
Den
ial
o
f
S
er
v
ice
(
S2
)
[
1
6
]
,
Ma
l
w
ar
e
&
s
p
a
m
(
S3
)
.
I
f
o
n
l
y
o
n
e
o
f
t
h
e
s
u
b
-
g
o
al
s
is
r
ea
ch
ed
,
th
e
g
o
al
o
f
th
e
a
tt
ac
k
er
w
il
l
b
e
ac
co
m
p
lis
h
ed
.
I
t
is
p
o
s
s
ib
le
to
ex
ten
d
th
is
lis
t
a
n
d
ad
d
s
ev
er
al
s
u
b
-
tar
g
ets.
T
h
e
lis
t
o
f
s
u
b
-
g
o
al
s
co
u
ld
b
e
ex
ten
d
ed
an
d
o
th
er
s
u
b
-
g
o
al
s
m
i
g
h
t b
e
i
n
clu
d
ed
.
-
I
n
th
e
f
o
llo
w
in
g
s
tep
,
we
co
n
tin
u
e
t
h
e
b
u
ild
i
n
g
o
f
t
h
e
d
if
f
er
e
n
t
ele
m
e
n
t
s
(
leav
es
)
of
o
u
r
attac
k
t
h
r
ee
m
o
d
el
s
:
a.
T
h
e
f
ir
s
t
s
u
b
-
g
o
al
"
b
lack
h
o
le"
ca
n
b
e
r
ea
ch
ed
b
y
co
m
b
i
n
in
g
t
w
o
-
ele
m
e
n
t:
ch
ea
t
t
h
e
r
o
u
ti
n
g
p
r
o
to
co
l
(
E
1
)
an
d
estab
lis
h
a
f
o
r
g
ed
r
o
u
te
(
E
2
)
I
n
a
b
lack
h
o
le
attac
k
,
th
e
r
o
u
tin
g
p
r
o
to
co
l
is
tr
ick
ed
b
y
a
m
alicio
u
s
n
o
d
e
in
o
r
d
er
to
h
a
v
e
a
b
r
ief
r
o
u
te
to
th
e
tar
g
et
n
o
d
e.
On
ce
a
p
ath
w
a
y
i
s
cr
ea
ted
b
et
w
ee
n
th
e
s
p
i
te
f
u
l
n
o
d
e
an
d
th
e
tar
g
et
n
o
d
e,
th
e
attac
k
er
ca
n
r
e
m
o
v
e
i
n
co
m
i
n
g
an
d
o
u
tg
o
i
n
g
tr
af
f
ic
w
i
th
o
u
t
in
f
o
r
m
in
g
t
h
e
s
o
u
r
ce
t
h
at
t
h
e
p
ac
k
e
ts
s
en
t
h
a
v
e
n
o
t
r
ea
ch
ed
t
h
eir
d
esti
n
a
tio
n
.
Mo
r
eo
v
er
,
th
e
atta
ck
er
ca
n
f
o
r
w
ar
d
t
h
e
p
ac
k
ets
an
y
w
h
er
e
t
h
e
y
w
a
n
t [
1
7
]
.
b.
Den
ial
o
f
Ser
v
ice
(
S2
)
r
ep
r
esen
ts
t
h
e
s
ec
o
n
d
s
u
b
-
g
o
al
T
h
e
d
en
ial
o
f
s
er
v
ice
o
r
Do
S
is
an
attac
k
i
n
w
h
ic
h
th
e
a
ttac
k
er
ai
m
s
to
m
a
k
e
a
s
er
v
er
,
s
e
r
v
ice,
o
r
in
f
r
astru
ct
u
r
e
i
n
ac
ce
s
s
ib
le
f
o
r
an
u
n
d
ef
i
n
ed
d
u
r
atio
n
.
T
h
is
s
u
b
-
g
o
al
ca
n
b
e
ac
h
iev
ed
t
h
r
o
u
g
h
:
C
h
a
n
n
el
j
am
m
i
n
g
(
S2
1
)
:
th
e
attac
k
er
’
s
g
o
al,
th
r
o
u
g
h
ch
a
n
n
el
j
am
m
i
n
g
,
is
to
b
lo
ck
n
o
d
es
f
r
o
m
r
ea
ch
in
g
n
et
w
o
r
k
s
er
v
ice
s
.
T
h
is
o
b
j
ec
tiv
e
ca
n
b
e
ac
h
ie
v
e
d
b
y
tr
a
n
s
m
itt
in
g
d
u
m
m
y
m
ess
a
g
es
(
E
3
)
in
w
h
ic
h
t
h
e
attac
k
er
tr
an
s
m
i
ts
v
ar
io
u
s
m
e
s
s
a
g
es
to
th
e
o
t
h
er
v
e
h
icle
s
u
s
i
n
g
f
a
k
e
id
en
titi
es.
T
h
r
o
u
g
h
tr
an
s
m
itti
n
g
d
u
m
m
y
m
e
s
s
a
g
es,
th
e
at
tack
er
ca
n
attai
n
h
is
m
ai
n
g
o
al
th
a
t
co
n
s
is
t
s
o
f
d
ec
r
ea
s
ed
th
e
r
eliab
ilit
y
a
n
d
e
f
f
icie
n
c
y
o
f
t
h
e
n
et
w
o
r
k
,
f
u
r
t
h
er
m
o
r
e,
f
o
r
cin
g
c
er
tain
v
e
h
icle
s
to
e
x
it
t
h
e
r
o
ad
s
f
o
r
h
i
s
o
w
n
b
en
e
f
it
[
1
8
]
.
C
h
a
n
n
el
j
am
m
in
g
m
a
y
also
b
e
o
b
tain
ed
by
b
r
o
ad
ca
s
tin
g
h
i
g
h
-
f
r
eq
u
e
n
c
y
s
i
g
n
als
(
E
4
)
.
T
h
is
tas
k
i
n
v
o
l
v
es
t
h
e
at
tac
k
er
tr
an
s
m
itti
n
g
r
eq
u
est
m
e
s
s
ag
e
s
w
it
h
h
ig
h
er
f
r
eq
u
e
n
c
y
,
w
h
ic
h
i
n
d
u
ce
s
a
s
y
s
te
m
f
ail
u
r
e.
C
o
n
s
eq
u
e
n
tl
y
,
o
th
er
n
o
d
es c
an
n
o
t r
ec
eiv
e
o
r
tr
an
s
m
it p
ac
k
ets i
n
n
et
w
o
r
k
[
1
9
]
.
S
m
u
r
f
in
g
(
E
5
)
:
T
h
e
s
m
u
r
f
tech
n
iq
u
e
u
s
es
th
e
b
r
o
ad
ca
s
t
s
er
v
er
s
to
p
ar
al
y
ze
t
h
e
n
et
w
o
r
k
.
T
h
is
s
er
v
er
is
ca
p
ab
le
to
d
u
p
l
icate
m
es
s
ag
e
s
an
d
s
en
d
i
n
g
it
to
all
n
o
d
es
o
n
th
e
s
a
m
e
n
et
w
o
r
k
.
A
ct
u
all
y
,
th
e
m
alicio
u
s
n
o
d
e
s
e
n
d
s
a
p
in
g
r
eq
u
es
t
to
o
n
e
o
r
m
o
r
e
b
r
o
ad
ca
s
t
s
er
v
er
s
b
y
f
als
if
y
i
n
g
th
e
s
o
u
r
ce
I
P
ad
d
r
ess
an
d
b
y
p
r
o
v
id
i
n
g
th
e
I
P
ad
d
r
ess
o
f
a
tar
g
et
m
ac
h
in
e
[
2
0
]
.
T
h
en
,
t
h
e
b
r
o
ad
ca
s
tin
g
s
er
v
er
p
ass
e
s
o
n
th
e
r
eq
u
es
t
to
th
e
e
n
tire
n
et
wo
r
k
.
A
ll
n
o
d
es
o
n
t
h
e
n
et
w
o
r
k
s
e
n
d
a
r
esp
o
n
s
e
to
t
h
e
b
r
o
ad
ca
s
tin
g
s
er
v
er
.
Fin
all
y
,
th
e
b
r
o
ad
ca
s
t
s
er
v
er
r
ed
ir
ec
ts
r
esp
o
n
s
es
to
th
e
tar
g
et
m
ac
h
i
n
e.
Mo
r
eo
v
er
,
w
h
e
n
th
e
m
al
icio
u
s
n
o
d
e
s
en
d
s
a
r
eq
u
e
s
t
to
s
ev
er
al
b
r
o
ad
ca
s
t
s
er
v
er
s
lo
ca
ted
o
n
d
i
f
f
er
e
n
t
n
et
w
o
r
k
s
,
al
l
th
e
r
esp
o
n
s
es
f
r
o
m
th
e
n
o
d
es
o
n
th
e
d
if
f
er
en
t
n
et
w
o
r
k
s
w
i
ll
b
e
r
o
u
ted
to
th
e
tar
g
e
t
m
ac
h
in
e.
I
n
t
h
is
w
a
y
,
m
o
s
t
o
f
th
e
at
tack
er
'
s
j
o
b
is
to
f
in
d
a
l
is
t
o
f
b
r
o
ad
ca
s
t
s
er
v
er
s
a
n
d
f
a
ls
if
y
th
e
r
ep
l
y
ad
d
r
ess
i
n
o
r
d
er
to
d
ir
ec
t
th
e
m
to
th
e
tar
g
et
m
ac
h
i
n
e.
Flo
o
d
in
g
(
S2
2
)
:
th
i
s
tech
n
iq
u
e
co
n
s
is
t
s
o
f
s
en
d
i
n
g
a
lar
g
e
q
u
an
tit
y
o
f
u
s
ele
s
s
d
ata
i
n
t
h
e
n
e
t
w
o
r
k
in
o
r
d
er
to
m
ak
e
it
u
n
u
s
ab
le,
f
o
r
ex
a
m
p
le
b
y
s
at
u
r
ati
n
g
its
b
an
d
w
id
t
h
o
r
b
y
ca
u
s
in
g
th
e
n
o
d
es
o
f
th
e
n
et
w
o
r
k
to
cr
ash
,
w
h
o
s
e
d
en
ial
o
f
s
er
v
ice
i
s
t
h
e
p
o
s
s
ib
le
co
n
s
eq
u
e
n
ce
.
T
h
is
attac
k
ca
n
b
e
ca
r
r
i
ed
o
u
t
w
it
h
t
w
o
task
s
:
SYN
f
lo
o
d
(
E
6
)
o
r
UDP
f
lo
o
d
(
E
7
)
[
2
1
]
.
T
h
e
SYN
f
lo
o
d
[
2
2
]
aim
s
to
s
atu
r
ate
a
s
er
v
er
b
y
s
e
n
d
in
g
a
m
u
lt
itu
d
e
o
f
T
C
P
p
ac
k
ets
in
o
r
d
er
to
o
v
er
w
h
el
m
t
h
e
tar
g
et
s
er
v
er
w
i
th
SYN
(
S
y
n
c
h
r
o
n
ized
)
r
eq
u
ests
e
n
m
ass
e.
T
h
is
w
il
l
ai
m
to
cr
ea
te
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
10
,
No
.
6
,
Dec
em
b
er
2
0
2
0
:
6
0
3
9
-
6
0
4
4
6042
a
m
u
ltit
u
d
e
o
f
co
n
n
ec
tio
n
s
r
eq
u
ir
in
g
a
lar
g
e
n
u
m
b
er
o
f
s
y
s
te
m
r
eso
u
r
ce
s
.
T
h
e
tar
g
et
i
s
t
h
e
n
o
v
er
w
h
el
m
ed
b
y
t
h
ese
r
eq
u
e
s
ts
a
n
d
ca
n
n
o
l
o
n
g
er
r
esp
o
n
d
to
leg
iti
m
ate
r
e
q
u
ests
.
L
i
k
e
th
e
SYN
f
lo
o
d
,
in
th
e
UDP
f
lo
o
d
,
th
e
attac
k
er
tr
a
n
s
m
i
ts
s
ev
er
al
UDP
r
eq
u
ests
to
th
e
tar
g
eted
s
y
s
te
m
in
o
r
d
er
to
o
v
er
w
h
el
m
it.
U
n
li
k
e
T
C
P
tr
an
s
m
is
s
i
o
n
,
d
ata
ca
n
b
e
tr
an
s
f
er
r
ed
v
ia
UDP
w
it
h
o
u
t
th
e
n
ee
d
f
o
r
a
n
estab
li
s
h
ed
co
n
n
ec
t
io
n
.
As
UDP
tr
af
f
ic
tak
e
s
p
r
io
r
it
y
o
v
er
T
C
P
,
it
m
a
y
q
u
ick
l
y
in
ter
r
u
p
t
an
d
s
atu
r
ate
t
h
e
n
e
t
w
o
r
k
tr
af
f
i
c.
c.
T
h
e
f
in
al
s
u
b
-
g
o
al
is
m
al
w
ar
e
an
d
s
p
a
m
(
S3
)
Ma
licio
u
s
s
o
f
t
w
ar
e
(
Ma
l
w
ar
e)
is
a
p
r
o
g
r
a
m
d
e
v
elo
p
ed
b
y
m
alicio
u
s
to
d
a
m
a
g
e
a
co
m
p
u
te
r
s
y
s
te
m
o
r
ac
ce
s
s
to
th
e
p
r
i
v
ate
p
er
s
o
n
al
i
n
f
o
r
m
atio
n
,
w
it
h
o
u
t
t
h
e
co
n
s
en
t
o
f
t
h
e
u
s
er
o
r
th
e
tar
g
et
n
o
d
e
th
at
i
s
in
f
ec
ted
.
Oth
er
w
i
s
e,
in
s
p
a
m
m
es
s
ag
e
s
,
th
e
attac
k
er
f
o
r
w
ar
d
s
s
ev
er
al
u
n
s
o
licited
e
m
ail
s
to
an
ad
d
r
ess
in
o
r
d
er
to
o
v
er
lo
ad
its
m
a
ilb
o
x
an
d
th
at
to
s
ca
t
ter
ed
th
e
atte
n
t
io
n
o
f
t
h
e
u
s
er
f
r
o
m
i
m
p
o
r
tan
t
m
es
s
ag
e
s
[
2
1
]
.
T
o
r
ea
ch
th
is
s
u
b
-
g
o
al
(
S3
)
,
it
is
r
eq
u
is
ite
to
ca
r
r
y
o
u
t:
a)
I
n
s
er
ted
v
ir
u
s
e
s
an
d
w
o
r
m
s
(
E
8
)
in
a
r
eliab
le
p
r
o
g
r
am
by
i
n
cl
u
d
in
g
a
clo
n
e
of
its
e
lf
a
n
d
b
ein
g
p
ar
t
of
it
,
b
)
Th
r
o
u
g
h
s
u
b
m
it
tin
g
s
p
am
m
ess
a
g
e
s
,
th
e
attac
k
er
u
s
e
s
t
h
e
q
u
o
ta
t
h
at
i
s
a
v
ailab
le
i
n
a
n
e
-
m
ail
s
er
v
ice
to
p
r
e
v
en
t
l
eg
iti
m
ate
m
es
s
ag
e
s
f
r
o
m
b
ein
g
s
e
n
t.
Fig
u
r
e
1
.
A
ttac
k
t
r
ee
m
o
d
el
f
o
r
VA
NE
T
a
v
ailab
ilit
y
o
f
t
h
e
n
et
w
o
r
k
4.
RIS
K
AS
SE
S
SM
E
NT
T
h
e
attac
k
er
n
ee
d
s
to
co
n
s
id
er
v
ar
io
u
s
f
ea
tu
r
e
s
co
n
tai
n
i
n
g
t
h
e
attac
k
co
s
t,
tec
h
n
iq
u
e
d
if
f
ic
u
lt
y
,
an
d
th
e
p
o
s
s
ib
ilit
y
o
f
b
ei
n
g
d
i
s
co
v
er
ed
.
T
h
e
m
ai
n
o
b
j
ec
tiv
e
is
to
ass
ig
n
v
al
u
es
to
ea
ch
n
o
d
e
in
th
e
a
ttack
tr
ee
.
I
n
th
i
s
w
o
r
k
,
w
e
r
eg
ar
d
th
r
ee
attr
ib
u
tes
o
f
t
h
e
lea
f
n
o
d
es
w
h
ic
h
ar
e:
attac
k
co
s
t
c
L
,
tech
n
ical
d
if
f
ic
u
lt
y
d
L
,
an
d
th
e
d
i
s
co
v
er
i
n
g
d
i
f
f
icu
lt
y
s
L
.
T
h
e
g
r
ad
e
-
lev
el
s
ta
n
d
ar
d
s
ar
e
ill
u
s
tr
ated
i
n
T
ab
le
1
.
T
h
o
s
e
v
alu
e
s
ar
e
attr
ib
u
ted
to
leaf
n
o
d
es
d
ep
en
d
in
g
o
n
t
h
e
m
ea
s
u
r
es
cited
i
n
[
2
3
]
.
W
e
u
s
e
th
e
m
u
lti
-
attr
ib
u
t
e
u
tili
t
y
th
eo
r
y
[
2
4
]
in
o
th
er
to
r
elo
ca
te
t
h
ese
f
ea
tu
r
es
i
n
to
attac
k
er
s
’
u
tili
t
y
v
alu
e
P
L
,
w
h
ic
h
is
th
e
p
r
o
b
ab
ilit
y
o
f
a
leaf
n
o
d
e
o
cc
u
r
r
in
g
.
Fo
r
m
u
la
(
1
)
is
u
s
ed
to
ca
lcu
late
ea
ch
lea
f
n
o
d
e
'
s
u
tili
t
y
.
P
L
=
w
1
×
u
(
c
L
)
+
w
2
×
u
(
d
L
)
+
w
3
×
u
(
s
L
)
(
1
)
w
h
er
e
u
(
c
L
)
,
u
(
d
L
)
,
u
(
s
L
)
ar
e
th
e
u
tili
t
y
f
u
n
ct
io
n
o
f
c
L
,
d
L
an
d
S
L
r
esp
ec
tiv
el
y
,
an
d
th
eir
v
alu
es
ar
e
co
n
f
i
n
ed
b
et
w
ee
n
[
0
,
1
]
.
w
1
,
w
2
,
w
3
ar
e
th
e
w
ei
g
h
t
s
o
f
th
e
u
ti
liti
e
s
w
h
er
e
:
w
1
+
w
2
+
w
3
=
1
.
So
,
w
e
ca
n
ad
m
it
t
h
at
w
1
=
w
2
=
w
3
=
1
/
3
,
an
d
w
e
s
u
p
p
o
s
e
th
at
u
(
c
L
)
=
u
(
d
L
)
=
u
(
s
L
)
=
u
(
x
)
=
c
/
x
(
w
h
er
e
c
=
0
.
2
)
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2
0
8
8
-
8708
A
r
is
k
a
n
d
s
ec
u
r
ity
a
s
s
ess
men
t o
f V
A
N
E
T a
va
ila
b
ilit
y
u
s
in
g
a
tta
ck
tr
ee
co
n
ce
p
t (
Mer
iem
H
o
u
mer)
6043
T
ab
le
2
p
r
esen
ts
th
e
p
r
o
b
ab
il
it
y
P
L
th
at
ea
ch
leaf
n
o
d
e
w
ill
o
cc
u
r
.
Fu
r
th
er
m
o
r
e,
th
e
attac
k
tr
ee
is
co
n
v
er
ted
to
b
in
ar
y
d
ec
is
io
n
d
iag
r
a
m
(
B
DD)
[
2
5
]
in
o
t
h
er
to
co
m
p
u
te
t
h
e
o
v
er
all
p
r
o
b
ab
ilit
y
o
f
ac
h
iev
in
g
th
e
o
b
j
ec
tiv
e
o
f
th
e
attac
k
.
T
h
is
p
r
o
b
ab
ilit
y
eq
u
al
s
0
.
2
3
3
6
.
T
ab
le
1
.
Gr
a
d
e
s
tan
d
ar
d
A
t
t
a
c
k
c
o
st
(
c
L
)
T
e
c
h
n
i
c
a
l
d
i
f
f
i
c
u
l
t
y
(
d
L
)
D
i
sco
v
e
r
i
n
g
d
i
f
f
i
c
u
l
t
y
(
s
L
)
G
r
a
d
e
>
1
0
Q
u
i
t
e
d
i
f
f
i
c
u
l
t
Q
u
i
t
e
s
i
m
p
l
e
5
6
–
10
D
i
f
f
i
c
u
l
t
S
i
mp
l
e
4
3
–
6
M
e
d
i
a
t
e
M
e
d
i
a
t
e
3
0
.
5
–
3
S
i
mp
l
e
D
i
f
f
i
c
u
l
t
2
<
0
.
5
Q
u
i
t
e
s
i
m
p
l
e
Q
u
i
t
e
d
i
f
f
i
c
u
l
t
1
T
ab
le
2
.
A
ttrib
u
te
v
al
u
e
s
f
o
r
l
ea
f
n
o
d
es a
n
d
it
s
o
cc
u
r
r
en
ce
p
r
o
b
ab
ilit
y
L
e
a
f
n
o
d
e
A
t
t
a
c
k
c
o
st
(
)
T
e
c
h
n
i
c
a
l
d
i
f
f
i
c
u
l
t
y
(
)
D
i
sco
v
e
r
i
n
g
d
i
f
f
i
c
u
l
t
y
(
)
O
c
c
u
r
r
e
n
c
e
p
r
o
b
a
b
i
l
i
t
y
(
)
1
3
4
1
0
.
1
0
5
2
3
2
1
0
.
1
2
2
3
5
2
5
0
.
0
6
4
2
3
4
0
.
0
7
2
5
5
1
3
0
.
1
0
2
6
4
2
3
0
.
0
7
2
7
4
2
3
0
.
0
7
2
8
2
1
4
0
.
1
1
6
9
3
4
2
0
.
0
7
2
Af
ter
th
at,
w
e
ar
e
co
n
s
tr
u
c
tin
g
th
e
attac
k
s
eq
u
e
n
ce
s
d
ep
en
d
in
g
o
n
o
u
r
attac
k
-
d
e
f
en
s
e
tr
ee
.
T
h
e
s
eq
u
en
ce
s
o
f
th
e
a
ttack
a
r
e
a
r
ea
l
p
ath
co
n
s
is
t
in
g
o
f
a
leaf
n
o
d
e
g
r
o
u
p
.
O
n
l
y
w
h
e
n
all
attac
k
s
eq
u
e
n
ce
ev
en
t
s
o
cc
u
r
,
th
e
at
tack
er
c
an
ac
h
ie
v
e
h
is
f
i
n
al
o
b
j
ec
ti
v
e.
W
h
en
t
h
e
attac
k
s
eq
u
e
n
ce
s
w
er
e
k
n
o
w
n
,
th
eir
o
cc
u
r
r
en
ce
p
r
o
b
ab
ilit
ies
ca
n
b
e
ca
lcu
lated
a
n
d
th
e
n
co
m
p
ar
ed
to
f
in
d
w
h
ic
h
attac
k
s
eq
u
en
ce
t
h
e
attac
k
er
co
u
ld
m
o
s
t
p
r
o
b
ab
ly
la
u
n
c
h
.
An
attac
k
s
eq
u
e
n
ce
is
d
escr
ib
e
d
as
:
S
i
=
(
E
1
,
E
2
,
…
,
E
n
)
So
,
th
e
p
r
o
b
ab
ilit
y
o
f
a
n
attac
k
s
eq
u
e
n
ce
is
:
P
S
(
S
i
)
=
P
(
E
1
)
×
P
(
E
2
)
…
×
P
(
E
n
)
(
2
)
I
n
o
r
d
er
to
o
b
tain
all
attac
k
s
eq
u
en
ce
s
f
o
r
o
u
r
attac
k
-
d
ef
en
s
e
tr
ee
,
w
e
u
s
e
t
h
e
B
o
o
lean
alg
eb
r
a
m
et
h
o
d
.
T
h
e
attac
k
s
eq
u
en
ce
s
to
attain
th
e
at
tack
g
o
al
ar
e:
S1={
E
1,E
2},
S2={
E
3}
,
S3
={E
4},
S4=
{E5},
S5={
E
6},
S6={
E
7},
S7=
{E8},
S8={
E
9}.
T
h
e
f
ir
s
t
s
eq
u
en
ce
{
E
1
,
E
2
}
i
m
p
l
y
t
h
at
th
e
ad
v
er
s
ar
y
ca
n
m
a
k
e
th
e
n
et
w
o
r
k
u
n
a
v
ailab
le
b
y
c
h
ea
ti
n
g
th
e
r
o
u
ti
n
g
p
r
o
to
co
l
(
E
1
)
an
d
E
s
tab
lis
h
a
f
o
r
g
ed
r
o
u
te
(
E
2
)
,
b
u
t
in
th
e
s
ec
o
n
d
s
eq
u
en
ce
,
t
h
e
atta
ck
er
r
eq
u
is
it
e
ju
st
th
r
o
u
g
h
tr
a
n
s
m
it
d
u
m
m
y
m
es
s
ag
e
s
(
E
3
)
an
d
s
o
o
n
.
B
ased
o
n
th
e
(
2
)
,
w
e
co
m
p
u
te
th
e
a
ttack
s
eq
u
e
n
ce
s
o
cc
u
r
r
en
ce
p
r
o
b
ab
ilit
ies
w
h
ic
h
ar
e
s
h
o
w
n
in
T
ab
le
3
.
Fro
m
T
ab
le
3
,
w
e
ca
n
d
ed
u
ce
t
h
at
th
e
attac
k
s
eq
u
en
c
e
S7
is
th
e
m
o
s
t p
r
o
b
ab
le
p
ath
to
o
cc
u
r
.
T
h
u
s
,
to
k
ee
p
th
e
n
et
w
o
r
k
p
r
o
tecte
d
w
e
s
h
o
u
ld
f
o
c
u
s
o
n
t
h
i
s
attac
k
.
T
ab
le
3
.
Occ
u
r
r
en
ce
p
r
o
b
ab
ilit
ies o
f
attac
k
s
eq
u
e
n
ce
s
A
t
t
a
c
k
se
q
u
e
n
c
e
O
c
c
u
r
r
e
n
c
e
p
r
o
b
a
b
i
l
i
t
y
(
)
1
0
.
0
1
2
8
2
0
.
0
6
3
0
.
0
7
2
4
0
.
1
0
2
5
0
.
0
7
2
6
0
.
0
7
2
7
0
.
1
1
6
8
0
.
0
7
2
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
10
,
No
.
6
,
Dec
em
b
er
2
0
2
0
:
6
0
3
9
-
6
0
4
4
6044
5.
CO
NCLU
SI
O
N
I
n
th
i
s
p
ap
er
,
w
e
ar
e
p
r
o
p
o
s
in
g
a
n
e
w
s
ec
u
r
it
y
an
a
l
y
s
is
m
et
h
o
d
b
ased
o
n
th
e
attac
k
-
tr
ee
t
o
an
al
y
ze
th
e
r
is
k
o
f
V
A
NE
T
av
ailab
ilit
y
f
r
o
m
a
s
y
s
te
m
p
o
in
t
o
f
v
ie
w.
Fu
r
th
er
m
o
r
e,
w
e
ar
e
co
n
s
tr
u
ctin
g
an
attac
k
tr
ee
w
it
h
V
A
NE
T
av
ailab
ilit
y
leak
ag
e
as
th
e
g
lo
b
al
o
b
j
ec
tiv
e
to
an
al
y
ze
t
h
e
b
eh
a
v
io
r
o
f
th
e
att
ac
k
er
.
T
o
m
ea
s
u
r
e
th
e
s
y
s
te
m
r
is
k
,
w
e
ar
e
ass
i
g
n
in
g
v
a
lu
e
s
to
all
leaf
n
o
d
e
s
o
f
th
e
tr
ee
an
d
ad
o
p
t
th
e
m
u
lti
-
attr
ib
u
te
u
tili
t
y
m
et
h
o
d
s
o
th
e
a
s
s
es
s
m
en
t
w
o
u
ld
b
e
m
o
r
e
an
al
y
tical.
B
ased
o
n
th
e
a
n
al
y
s
i
s
o
f
t
h
e
attac
k
s
eq
u
e
n
ce
s
,
w
e
r
ec
o
g
n
ize
th
e
m
o
s
t
p
r
o
b
ab
le
p
ath
th
at
th
e
attac
k
er
m
i
g
h
t
s
elec
t.
I
n
o
u
r
f
u
t
u
r
e
w
o
r
k
,
w
e
w
i
ll
p
r
esen
t
a
VA
NE
T
p
r
iv
ac
y
an
d
s
ec
u
r
it
y
r
i
s
k
as
s
es
s
m
en
t
b
ased
o
n
th
e
attac
k
-
d
e
f
en
s
e
tr
ee
m
o
d
el.
T
h
at
m
o
d
el
an
al
y
ze
s
th
e
d
ef
e
n
s
e
s
tr
ateg
ie
s
o
f
t
h
e
s
y
s
te
m
.
RE
F
E
R
E
NC
E
S
[1
]
T
.
O.
F
a
h
a
d
,
A
.
A
.
A
li
,
“
Co
m
p
r
e
ss
e
d
f
u
z
z
y
lo
g
ic
b
a
se
d
m
u
lt
i
-
c
r
it
e
ria
A
O
DV
ro
u
ti
n
g
in
V
A
NET
e
n
v
iro
n
m
e
n
t
,
”
In
ter
n
a
t
io
n
a
l
J
o
u
rn
a
l
o
f
E
lec
trica
l
a
n
d
C
o
mp
u
ter
En
g
in
e
e
rin
g
(
IJ
ECE
)
,
v
o
l.
9
,
n
o
.
1
,
p
p
.
3
9
7
-
4
0
1
,
2
0
1
9
.
[2
]
O.
M
a
h
m
a
,
e
t
a
l.
,
“
A
n
E
ff
icie
n
t
Bro
a
d
c
a
st
P
r
o
to
c
o
l
f
o
r
Warn
in
g
M
e
ss
a
g
e
Diss
e
m
in
a
ti
o
n
in
V
A
N
ET
s,
”
J
o
u
rn
a
l
o
f
c
o
mp
u
ti
n
g
a
n
d
i
n
f
o
rm
a
ti
o
n
tec
h
n
o
lo
g
y
,
v
o
l.
2
6
,
n
o
.
3
,
p
p
.
1
5
7
-
1
6
6
,
2
0
1
8
.
[3
]
P
.
Niv
e
th
a
,
a
n
d
S
.
M
u
ru
g
a
n
a
n
t
h
a
m
,
“L
e
v
e
r
a
g
e
in
g
Ro
u
te
S
a
v
in
g
in
L
o
c
a
ti
o
n
Ba
se
d
S
e
rv
ice
s
o
n
V
A
NE
T
Us
in
g
KNN,
”
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
E
n
g
i
n
e
e
rin
g
S
c
ien
c
e
,
p
p
.
3
1
7
9
-
3
1
8
3
,
2
0
1
6
.
[4
]
C.
K.
K
a
rn
a
n
d
C
.
P
.
G
u
p
ta
,
“
A
su
rv
e
y
o
n
V
A
NETs
se
c
u
rit
y
a
tt
a
c
k
s
a
n
d
S
y
b
il
a
tt
a
c
k
d
e
tec
ti
o
n
,
”
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
S
e
n
so
rs
W
ire
les
s Co
mm
u
n
ica
t
io
n
s a
n
d
C
o
n
tr
o
l
,
v
o
l.
6
,
n
o
.
1
,
p
p
.
4
5
-
6
2
,
2
0
1
6
.
[5
]
B
.
S
c
h
n
e
ier,
“
A
tt
a
c
k
T
r
e
e
s,
”
Dr
.
Do
b
b
'
s J
o
u
rn
a
l
o
f
S
o
ft
w
a
re
T
o
o
ls
,
v
o
l.
2
4
,
n
o
.
1
2
,
p
p
.
2
1
-
2
9
,
1
9
9
9
.
[6
]
B.
S
c
h
n
e
ier,
“
S
e
c
re
ts an
d
L
ies
:
Dig
it
a
l
S
e
c
u
rit
y
in
a
Ne
tw
o
rk
e
d
Wo
rld
,
”
J
o
h
n
wil
e
y
&
S
o
n
s
,
2
0
15
.
[7
]
S
.
M
a
u
w
a
n
d
M
.
Oo
st
d
ij
k
,
“
F
o
u
n
d
a
ti
o
n
s
o
f
A
tt
a
c
k
T
re
e
s,
”
i
n
In
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
I
n
fo
rm
a
ti
o
n
S
e
c
u
ri
ty a
n
d
Cry
p
to
lo
g
y
,
p
p
.
1
8
6
-
1
9
8
,
2
0
0
5
.
[8
]
S
.
Bistare
ll
i,
e
t
a
l.
,
“
S
trate
g
ic
g
a
m
e
s
o
n
d
e
f
e
n
se
tree
s
,”
i
n
In
ter
n
a
ti
o
n
a
l
W
o
rk
sh
o
p
o
n
Fo
rm
a
l
As
p
e
c
ts
in
S
e
c
u
rity
a
n
d
T
ru
st
,
S
p
rin
g
e
r,
p
p
.
1
-
1
5
,
2
0
0
6
.
[9
]
Y.
L
i,
e
t
a
l.
,
“
On
F
in
d
in
g
t
h
e
M
u
lt
ica
st
P
r
o
tec
ti
o
n
T
re
e
Co
n
sid
e
rin
g
S
RL
G
in
W
DM
Op
ti
c
a
l
Ne
t
w
o
rk
s
,
”
El
e
c
tro
n
ics
a
n
d
T
e
lec
o
mm
u
n
ica
ti
o
n
s R
e
se
a
rc
h
I
n
stit
u
te
,
v
o
l.
2
8
,
n
o
.
4
,
p
p
.
5
1
7
-
5
2
0
,
2
0
0
6
.
[1
0
]
B.
Ko
rd
y
,
e
t
a
l.
,
“
F
o
u
n
d
a
ti
o
n
s
o
f
A
tt
a
c
k
–
De
f
e
n
se
T
re
e
s,
”
i
n
In
ter
n
a
ti
o
n
a
l
W
o
rk
sh
o
p
o
n
Fo
rm
a
l
As
p
e
c
ts
in
S
e
c
u
rity
a
n
d
T
ru
st
,
p
p
.
8
0
-
9
5
,
2
0
1
0
.
[1
1
]
S
.
V
id
a
li
s
a
n
d
A
.
Jo
n
e
s,
“
Us
in
g
V
u
l
n
e
ra
b
il
i
ty
T
r
e
e
s
f
o
r
De
c
isio
n
M
a
k
in
g
in
T
h
re
a
t
A
ss
e
ss
m
e
n
t,
”
i
n
2
n
d
Eu
r
o
p
e
a
n
Co
n
fer
e
n
c
e
o
n
In
f
o
rm
a
ti
o
n
W
a
rfa
re
,
2
0
0
3
.
[1
2
]
M
.
Cre
m
o
n
in
i
a
n
d
P
.
M
a
rti
n
i
,
“
E
v
a
lu
a
ti
n
g
in
f
o
rm
a
ti
o
n
se
c
u
rit
y
in
v
e
st
m
e
n
ts
f
ro
m
a
tt
a
c
k
e
r
s
p
e
rsp
e
c
ti
v
e
:
th
e
re
tu
rn
-
on
-
a
tt
a
c
k
(ROA
)
,”
i
n
W
EIS
,
p
p
.
1
-
3
,
2
0
0
5
.
[1
3
]
R.
Ku
m
a
r,
e
t
a
l.
,
“
Qu
a
n
ti
tativ
e
a
tt
a
c
k
tre
e
a
n
a
l
y
sis
v
ia
p
rice
d
ti
m
e
d
a
u
to
m
a
ta
,”
i
n
In
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
Fo
rm
a
l
M
o
d
e
li
n
g
a
n
d
An
a
lys
is o
f
T
ime
d
S
y
ste
ms
,
p
p
.
1
5
6
-
1
7
1
,
2
0
1
5
.
[1
4
]
S
.
Du
a
n
d
H.
Zh
u
,
“
S
e
c
u
rit
y
A
s
se
ss
m
e
n
t
v
ia
A
tt
a
c
k
T
re
e
M
o
d
e
l,
”
S
e
c
u
rity
Asse
ss
m
e
n
t
in
Veh
icu
la
r
Ne
two
rk
s
,
p
p
.
9
-
1
6
,
2
0
1
3
.
[1
5
]
N.
P
a
n
d
a
a
n
d
B
.
K.
P
a
tt
a
n
a
y
a
k
,
“
A
n
a
l
y
sis
o
f
Bl
a
c
k
h
o
le
A
tt
a
c
k
in
A
OD
V
a
n
d
DSR
,”
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
El
e
c
trica
l
a
n
d
C
o
mp
u
ter
En
g
in
e
e
rin
g
,
v
o
l.
8
,
n
o
.
5
,
p
p
.
3
0
9
2
-
3
1
0
2
,
2
0
1
8
.
[1
6
]
W
.
A
h
m
e
d
a
n
d
M
.
El
h
a
d
e
f
,
“
Do
S
a
tt
a
c
k
s
a
n
d
c
o
u
n
term
e
a
su
re
s
in
V
A
NE
T
,
”
In
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
Fu
tu
re
In
fo
rm
a
t
io
n
T
e
c
h
n
o
l
o
g
y
,
p
p
.
3
3
3
-
341
,
2
0
1
8
.
[1
7
]
V
.
Bi
b
h
u
,
e
t
a
l.
,
“
P
e
rf
o
rm
a
n
c
e
An
a
ly
sis
o
f
Blac
k
Ho
le
A
tt
a
c
k
in
V
a
n
e
t,
”
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
Co
mp
u
ter
Ne
two
rk
a
n
d
In
f
o
rm
a
ti
o
n
S
e
c
u
rity
,
v
o
l.
4
,
n
o
.
1
1
,
p
p
.
4
7
-
54
,
2
0
1
2
.
[1
8
]
H.
Ha
sb
u
ll
a
h
,
e
t
a
l.
,
“
De
n
ial
o
f
se
rv
ice
(DO
S
)
a
tt
a
c
k
a
n
d
it
s
p
o
ss
ib
l
e
so
lu
ti
o
n
i
n
V
A
NET
,
”
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
El
e
c
tro
n
ics
a
n
d
C
o
mm
u
n
ica
ti
o
n
En
g
i
n
e
e
rin
g
,
v
o
l.
4
,
n
o
5
,
p
p
.
8
1
3
-
8
1
7
,
2
0
1
0
.
[1
9
]
S
.
A
.
Y
a
h
,
e
t
a
l.
,
“
Ne
w
to
n
-
ra
p
h
so
n
m
e
th
o
d
to
so
lv
e
s
y
ste
m
s
o
f
n
o
n
-
l
in
e
a
r
e
q
u
a
ti
o
n
s
in
V
A
NET
p
e
r
f
o
r
m
a
n
c
e
o
p
ti
m
iza
ti
o
n
,
”
B
u
ll
e
ti
n
o
f
El
e
c
trica
l
E
n
g
i
n
e
e
rin
g
a
n
d
I
n
fo
rm
a
ti
c
s
,
v
o
l.
8
,
n
o
1
,
p
p
.
3
3
6
-
3
4
2
,
2
0
1
9
.
[2
0
]
S
.
S
p
e
c
h
t
a
n
d
R.
L
e
e
,
“
T
a
x
o
n
o
m
ies
o
f
d
istri
b
u
te
d
d
e
n
ial
o
f
se
rv
ic
e
n
e
tw
o
rk
s,
a
tt
a
c
k
s,
to
o
ls
a
n
d
c
o
u
n
term
e
a
su
re
s,
”
CEL
2
0
0
3
-
0
3
,
P
r
in
c
e
to
n
Un
iv
e
rsi
ty
,
P
rin
c
e
to
n
,
NJ
,
USA
,
2
0
0
3
.
[2
1
]
M
.
Ho
u
m
e
r,
e
t
a
l.
,
“
S
e
c
u
rit
y
A
n
a
ly
sis
o
f
V
e
h
icu
lar
A
d
-
h
o
c
Ne
tw
o
rk
s
b
a
se
d
o
n
A
tt
a
c
k
T
re
e
,
”
i
n
2
0
1
8
In
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
S
e
lec
ted
T
o
p
ics
in
M
o
b
il
e
a
n
d
W
ire
les
s Ne
two
rk
in
g
(
M
o
W
N
e
T
)
,
p
p
.
2
1
-
2
6
,
2
0
1
8
.
[2
2
]
N.
K.
Ch
a
u
b
e
y
,
“
S
e
c
u
rit
y
a
n
a
l
y
si
s
o
f
v
e
h
icu
lar
a
d
h
o
c
n
e
tw
o
rk
s
(
V
A
NET
s):
a
c
o
m
p
re
h
e
n
siv
e
stu
d
y,
”
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
S
e
c
u
rity
a
n
d
Its
A
p
p
li
c
a
ti
o
n
s
,
v
o
l
.
1
0
,
n
o
.
5
,
p
p
.
2
6
1
-
2
7
4
,
2
0
1
6
.
[2
3
]
R.
J
ian
g
,
e
t
a
l.
,
“
A
n
a
tt
a
c
k
tree
b
a
se
d
risk
a
ss
e
ss
m
e
n
t
f
o
r
lo
c
a
ti
o
n
p
riv
a
c
y
in
w
irele
ss
se
n
so
r
n
e
tw
o
rk
s,
”
i
n
8
th
In
ter
n
a
t
io
n
a
l
C
o
n
fer
e
n
c
e
o
n
W
ire
les
s Co
mm
u
n
ica
t
io
n
s,
Ne
two
rk
in
g
a
n
d
M
o
b
il
e
C
o
mp
u
ti
n
g
,
p
p
.
1
-
4
,
2
0
1
2
.
[2
4
]
A
.
Ish
iza
k
a
a
n
d
P
.
Ne
m
e
r
y
,
“
M
u
lt
i
‐
a
tt
r
ib
u
te
u
ti
li
ty
th
e
o
ry
,
”
M
u
lt
i
‐
Criter
ia
De
c
isio
n
An
a
lys
i
s:
M
e
th
o
d
s
a
n
d
S
o
ft
w
a
re
,
2
0
1
3
.
[2
5
]
S
.
Ya
n
,
“
A
re
se
a
rc
h
o
n
v
a
riab
le o
rd
e
rin
g
m
e
th
o
d
s o
f
b
i
n
a
ry
d
e
c
isio
n
d
iag
ra
m
,
”
M
a
ste
r’s
T
h
e
sis,
S
h
a
n
g
h
a
i
Jia
o
T
o
n
g
Un
iv
e
rsit
y
,
S
h
a
n
g
h
a
i,
2
0
0
8
.
Evaluation Warning : The document was created with Spire.PDF for Python.