Login / Signup
Identification of Attack Paths Using Kill Chain and Attack Graphs.
Lukás Sadlek
Pavel Celeda
Daniel Tovarnák
Published in:
NOMS (2022)
Keyphrases
</>
attack graphs
attack graph
alert correlation
attack scenarios
security vulnerabilities
network configuration
information systems
unsupervised learning
intrusion detection