Login / Signup
Intruder model for generating attack scenarios in computer systems.
Lamia Hamza
Published in:
Int. J. Inf. Comput. Secur. (2020)
Keyphrases
</>
computer systems
operating system
databases
information systems
neural network
multistage
intrusion detection system
data analysis
data processing
computer security
information processing systems