Login / Signup
Mapping Cyber Threat Intelligence to Probabilistic Attack Graphs.
Andreas Gylling
Mathias Ekstedt
Zeeshan Afzal
Per Eliasson
Published in:
CSR (2021)
Keyphrases
</>
attack graphs
attack graph
cyber crime
probabilistic model
bayesian networks
data mining
knowledge discovery
crime investigation