Applying The Attacks Tracer on Advanced Persistent Threats to Real Networks.
Yuya TajimaHiroshi KoidePublished in: CANDAR (Workshops) (2021)
Keyphrases
- countermeasures
- malicious attacks
- denial of service attacks
- cyber attacks
- insider attacks
- security threats
- security breaches
- security risks
- computer security
- insider threat
- information security
- security vulnerabilities
- injection attacks
- attack scenarios
- data corruption
- identity theft
- security measures
- cyber security
- buffer overflow
- security protocols
- attack detection
- terrorist attacks
- dos attacks
- network security