Login / Signup
An end-to-end method for advanced persistent threats reconstruction in large-scale networks based on alert and log correlation.
Yifeng Wang
Yuanbo Guo
Chen Fang
Published in:
J. Inf. Secur. Appl. (2022)
Keyphrases
</>
end to end
high resolution