Estimating Time-To-Compromise for Industrial Control System Attack Techniques Through Vulnerability Data.
Engla Rencelj LingMathias EkstedtPublished in: SN Comput. Sci. (2023)
Keyphrases
- synthetic data
- image data
- database
- high quality
- data analysis
- high dimensional data
- statistical analysis
- data sets
- data objects
- data distribution
- data mining techniques
- fuzzy logic
- data points
- control system
- knowledge discovery
- data sources
- sensor data
- trade off
- raw data
- original data
- data quality
- data acquisition
- neural network