Login / Signup

Approaches to understanding the motivations behind cyber attacks.

Sumeet KumarKathleen M. Carley
Published in: ISI (2016)
Keyphrases
  • cyber attacks
  • countermeasures
  • anomaly detection