Sign in

Attack scenario reconstruction approach using attack graph and alert data mining.

Hao HuJing LiuYuchen ZhangYuling LiuXiaoyu XuJinglei Tan
Published in: J. Inf. Secur. Appl. (2020)
Keyphrases