Identifying Vulnerabilities in APT Attacks: A Simulated Approach.
Mathew NichoAdelaiye OluwasegunFaouzi KamounPublished in: NTMS (2018)
Keyphrases
- countermeasures
- security flaws
- security vulnerabilities
- security risks
- security mechanisms
- information security
- web services
- data corruption
- attack graphs
- buffer overflow
- simulation model
- attack scenarios
- test bed
- data sets
- security breaches
- security problems
- dos attacks
- malicious users
- security measures
- java card
- cyber attacks
- image watermarking
- security protocols
- computer security
- intrusion detection
- lightweight
- signal processing
- database systems
- neural network