Login / Signup
A Review of Colonial Pipeline Ransomware Attack.
Jack Beerman
David Berent
Zach Falter
Suman Bhunia
Published in:
CCGridW (2023)
Keyphrases
</>
genetic algorithm
countermeasures
literature review
social networks
database
secret key
current status
cyber attacks
detection mechanism
attack graph
abstract argumentation
malicious users