Keyphrases
- attack graphs
- attack graph
- penetration testing
- buffer overflow
- security vulnerabilities
- denial of service
- dos attacks
- security risks
- attack scenarios
- malicious attacks
- attack detection
- network configuration
- machine learning
- denial of service attacks
- alert correlation
- countermeasures
- detection mechanism
- data corruption
- secret key
- multiscale
- genetic algorithm