Login / Signup
A Novel Approach for Attack Tree to Attack Graph Transformation: Extended Version.
Nathan Daniel Schiele
Olga Gadyatskaya
Published in:
CoRR (2021)
Keyphrases
</>
graph transformation
countermeasures
secret key
data structure
nearest neighbor
malicious users
databases
neural network
information retrieval
knowledge base
data model
authentication protocol
cyber attacks
denial of service attacks
malicious attacks
attack detection