Login / Signup
An Exploratory Study on Artifacts for Cyber Attack Attribution Considering False Flag: Using Delphi and AHP Methods.
Soonil Hwang
Tae-Sung Kim
Published in:
IEEE Access (2023)
Keyphrases
</>
information systems
data analysis
access control