Login / Signup

Attack Detection Application with Attack Tree for Mobile System using Log Analysis.

Duhoe KimDongil ShinDongkyoo ShinYong-Hyun Kim
Published in: Mob. Networks Appl. (2019)
Keyphrases
  • attack detection
  • log analysis
  • multistage
  • mobile devices
  • user behavior
  • log data
  • countermeasures
  • attack scenarios