Login / Signup
Simulating attack behaviors in enterprise networks.
Stephen Moskal
Derek Kreider
Lydia Hays
Ben Wheeler
Shanchieh Jay Yang
Michael E. Kuhl
Published in:
CNS (2013)
Keyphrases
</>
human behavior
hidden markov models
data sets
malicious attacks
dynamic behavior
countermeasures
data mining
database
website
information systems
access control
genetic algorithm
finite state machines
secret key
social behavior
real world
behavior recognition
malicious behavior