Login / Signup

Intruder model for generating attack scenarios in computer systems.

Lamia Hamza
Published in: Int. J. Inf. Comput. Secur. (2020)
Keyphrases
  • computer systems
  • operating system
  • databases
  • information systems
  • neural network
  • multistage
  • intrusion detection system
  • data analysis
  • data processing
  • computer security
  • information processing systems