Login / Signup

Automated Vulnerability Testing via Executable Attack Graphs.

Drew MalzahnZachary BirnbaumCimone Wright-Hamor
Published in: Cyber Security (2020)
Keyphrases
  • attack graphs
  • attack graph
  • data mining
  • security vulnerabilities
  • network configuration
  • penetration testing