Sign in

Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks.

Orly StanRon BittonMichal EzretsMoran DadonMasaki InokuchiYoshinobu OhtaTomohiko YagyuYuval EloviciAsaf Shabtai
Published in: IEEE Trans. Dependable Secur. Comput. (2022)
Keyphrases