Login / Signup
Using cyber defense exercises to obtain additional data for attacker profiling.
Joel Brynielsson
Ulrik Franke
Muhammad Adnan Tariq
Stefan Varga
Published in:
ISI (2016)
Keyphrases
</>
data processing
data analysis
data mining techniques
data collection
knowledge discovery
data visualization
data mining
data sources
low cost
computer systems
anomaly detection
data acquisition
data mining methods