Login / Signup
An Effective Attack Scenario Construction Model based on Attack Steps and Stages Identification.
Taqwa Ahmed Alhaj
Maheyzah Md Siraj
Anazida Zainal
Inshirah Idris
Anjum Nazir
Fatin A. Elhaj
Tasneem Darwish
Published in:
CoRR (2021)
Keyphrases
</>
countermeasures
secret key
attack detection
cooperative
attack graph
key exchange protocol
attack graphs
real world
social networks
high quality
evolutionary algorithm
multistage
malicious attacks