Login / Signup
Adversarial Technique Validation & Defense Selection Using Attack Graph & ATT&CK Matrix.
Md Ariful Haque
Sachin Shetty
Charles A. Kamhoua
Kimberly Gold
Published in:
ICNC (2023)
Keyphrases
</>
attack graph
attack graphs
enterprise network
network security
neural network
objective function
intrusion detection
alert correlation