Login / Signup
Identification of Attack Paths Using Kill Chain and Attack Graphs.
Lukás Sadlek
Pavel Celeda
Daniel Tovarnák
Published in:
CoRR (2022)
Keyphrases
</>
attack graphs
attack graph
attack scenarios
alert correlation
network configuration
countermeasures
real time