Login / Signup

Open Source PowerShell-Written Post Exploitation Frameworks Used by Cyber Espionage Groups.

Tjada NelsonHoussain Kettani
Published in: ICICT (2020)
Keyphrases
  • open source
  • open source software
  • source code
  • open source projects
  • case study
  • real world
  • cyber security
  • database
  • data mining
  • search algorithm
  • relational databases