Login / Signup
Identifying Tactics of Advanced Persistent Threats with Limited Attack Traces.
Khandakar Ashrafi Akbar
Yigong Wang
Md Shihabul Islam
Anoop Singhal
Latifur Khan
Bhavani M. Thuraisingham
Published in:
ICISS (2021)
Keyphrases
</>
countermeasures
denial of service attacks
cyber attacks
data corruption
malicious attacks
attack scenarios
security issues
security measures
security vulnerabilities
learning algorithm
website
web intelligence
power analysis