Login / Signup
Vulnerability Correlation, Multi-step Attack and Exploit Chain in Breach and Attack Simulation.
Junhan Chen
Rufeng Liang
Man Zhang
Chengcong Zheng
Xun Huang
Hui Lu
Xiang Yu
Zhihong Tian
Published in:
CloudNet (2023)
Keyphrases
</>
multi step
attack graphs
countermeasures
attack graph
alert correlation
single step
security vulnerabilities
buffer overflow
neural network
knn
attack scenarios