Sign in

Adversarial Technique Validation & Defense Selection Using Attack Graph & ATT&CK Matrix.

Md Ariful HaqueSachin ShettyCharles A. KamhouaKimberly Gold
Published in: ICNC (2023)
Keyphrases
  • attack graph
  • attack graphs
  • enterprise network
  • network security
  • neural network
  • objective function
  • intrusion detection
  • alert correlation