Login / Signup
An Argumentation-Based Approach to Assist in the Investigation and Attribution of Cyber-Attacks.
Erisa Karafili
Linna Wang
Emil C. Lupu
Published in:
CoRR (2019)
Keyphrases
</>
cyber attacks
cyber security
cyber defense
countermeasures
critical infrastructure
dos attacks
intrusion detection
security policies
computer systems
low cost
data mining techniques
data processing
privacy preserving
privacy issues