Login / Signup

Vulnerability Correlation, Multi-step Attack and Exploit Chain in Breach and Attack Simulation.

Junhan ChenRufeng LiangMan ZhangChengcong ZhengXun HuangHui LuXiang YuZhihong Tian
Published in: CloudNet (2023)
Keyphrases
  • multi step
  • attack graphs
  • countermeasures
  • attack graph
  • alert correlation
  • single step
  • security vulnerabilities
  • buffer overflow
  • neural network
  • knn
  • attack scenarios