Login / Signup
Shaping Attacker Behavior: Evaluation of an Enhanced Cyber Maneuver Framework.
Jennifer A. McKneely
Tara K. Sell
Kathleen A. Straub
Mika D. Ayenson
Daniel Thomas
Published in:
HCI (32) (2022)
Keyphrases
</>
probabilistic model
main contribution
real time
artificial intelligence
evaluation method
database
neural network
data mining
website
case study
database systems
theoretical framework
closed loop
evaluation measures