Sign in

A Framework for Modeling Cyber Attack Techniques from Security Vulnerability Descriptions.

Hodaya BinyaminiRon BittonMasaki InokuchiTomohiko YagyuYuval EloviciAsaf Shabtai
Published in: KDD (2021)
Keyphrases
  • cyber attacks
  • cyber security
  • information systems
  • security issues
  • cyber defense
  • real time
  • intrusion detection
  • power system
  • network security
  • security breaches