Login / Signup
Leading attackers through attack graphs with deceptions.
Fred Cohen
Deanna Koike
Published in:
Comput. Secur. (2003)
Keyphrases
</>
attack graphs
attack graph
real time
medical images
network configuration
attack scenarios