Sign in

Intelligent Penetration and Attack Simulation System Based on Attack Chain.

Wei HaoChuanbao ShenXing YangChao Wang
Published in: ISCID (2022)
Keyphrases
  • countermeasures
  • malicious users
  • virtual reality
  • detection mechanism
  • data sets
  • learning algorithm
  • computer vision
  • e learning
  • knowledge base
  • decision trees
  • artificial neural networks
  • dos attacks
  • data corruption