Login / Signup

A Survey of Automatic Generation of Attack Trees and Attack Graphs.

Alyzia Maria KonstaBeatrice SpigaAlberto Lluch-LafuenteNicola Dragoni
Published in: CoRR (2023)
Keyphrases
  • attack graphs
  • attack graph
  • alert correlation
  • attack scenarios
  • network configuration
  • security vulnerabilities
  • data mining
  • supply chain
  • data processing