Login / Signup
Attack Detection Application with Attack Tree for Mobile System using Log Analysis.
Duhoe Kim
Dongil Shin
Dongkyoo Shin
Yong-Hyun Kim
Published in:
Mob. Networks Appl. (2019)
Keyphrases
</>
attack detection
log analysis
multistage
mobile devices
user behavior
log data
countermeasures
attack scenarios