Sign in

How to Design a Blue Team Scenario for Beginners on the Example of Brute-Force Attacks on Authentications.

Andreas EipperDaniela Pöhn
Published in: ICISSP (2023)
Keyphrases
  • brute force
  • computationally expensive
  • real world
  • exhaustive search
  • user interface
  • optimal solution
  • design process
  • search quality