Sign in

Identification of Attack Paths Using Kill Chain and Attack Graphs.

Lukás SadlekPavel CeledaDaniel Tovarnák
Published in: NOMS (2022)
Keyphrases
  • attack graphs
  • attack graph
  • alert correlation
  • attack scenarios
  • security vulnerabilities
  • network configuration
  • information systems
  • unsupervised learning
  • intrusion detection