Login / Signup
An effective attack scenario construction model based on identification of attack steps and stages.
Taqwa Ahmed Alhaj
Maheyzah Md Siraj
Anazida Zainal
Inshirah Idris
Anjum Nazir
Fatin A. Elhaj
Tasneem Darwish
Published in:
Int. J. Inf. Sec. (2023)
Keyphrases
</>
countermeasures
real world
malicious users
high quality
data driven
detection mechanism
decision trees
face recognition
lightweight
social networks
secret key
automatic identification
dos attacks
cyber attacks
block cipher
denial of service attacks
malicious attacks
abstract argumentation
real time