Login / Signup
Modeling advanced persistent threats using risk matrix methods.
Nina D. Ivanova
Vitaliy G. Ivanenko
Published in:
J. Comput. Virol. Hacking Tech. (2023)
Keyphrases
</>
significant improvement
high dimensional data
real time
feature extraction
computational cost
data mining techniques
empirical studies
benchmark datasets
risk management