Login / Signup

Modeling advanced persistent threats using risk matrix methods.

Nina D. IvanovaVitaliy G. Ivanenko
Published in: J. Comput. Virol. Hacking Tech. (2023)
Keyphrases
  • significant improvement
  • high dimensional data
  • real time
  • feature extraction
  • computational cost
  • data mining techniques
  • empirical studies
  • benchmark datasets
  • risk management