Login / Signup
Estimating Risk Boundaries for Persistent and Stealthy Cyber-Attacks.
Malik Shahzad Kaleem Awan
Pete Burnap
Omer F. Rana
Published in:
SafeConfig@CCS (2015)
Keyphrases
</>
cyber attacks
cyber security
countermeasures
dos attacks
intrusion detection system
critical infrastructure
computer systems
security policies
risk management
risk factors
risk assessment
risk analysis
security mechanisms
intrusion detection
privacy issues
data mining
real time
decision support system
low cost