Login / Signup

Modeling Attack Process of Advanced Persistent Threat Using Network Evolution.

Weina NiuXiaosong ZhangGuowu YangRuidong ChenDong Wang
Published in: IEICE Trans. Inf. Syst. (2017)
Keyphrases
  • countermeasures
  • statistical analysis
  • network evolution