Login / Signup

Leading attackers through attack graphs with deceptions.

Fred CohenDeanna Koike
Published in: Comput. Secur. (2003)
Keyphrases
  • attack graphs
  • attack graph
  • real time
  • medical images
  • network configuration
  • attack scenarios