C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Using cyber defense exercises to obtain additional data for attacker profiling.
Joel Brynielsson
Ulrik Franke
Muhammad Adnan Tariq
Stefan Varga
Published in:
ISI (2016)
Keyphrases
</>
data processing
data analysis
data mining techniques
data collection
knowledge discovery
data visualization
data mining
data sources
low cost
computer systems
anomaly detection
data acquisition
data mining methods