Login / Signup
Automated Vulnerability Testing via Executable Attack Graphs.
Drew Malzahn
Zachary Birnbaum
Cimone Wright-Hamor
Published in:
Cyber Security (2020)
Keyphrases
</>
attack graphs
attack graph
data mining
security vulnerabilities
network configuration
penetration testing