Sign in

Identification of Attack Paths Using Kill Chain and Attack Graphs.

Lukás SadlekPavel CeledaDaniel Tovarnák
Published in: CoRR (2022)
Keyphrases
  • attack graphs
  • attack graph
  • attack scenarios
  • alert correlation
  • network configuration
  • countermeasures
  • real time