Login / Signup

An Exploratory Study on Artifacts for Cyber Attack Attribution Considering False Flag: Using Delphi and AHP Methods.

Soonil HwangTae-Sung Kim
Published in: IEEE Access (2023)
Keyphrases
  • information systems
  • data analysis
  • access control