Login / Signup
Attack Graph Obfuscation.
Rami Puzis
Hadar Polad
Bracha Shapira
Published in:
CoRR (2019)
Keyphrases
</>
attack graph
attack graphs
enterprise network
reverse engineering
alert correlation
network configuration
static analysis
malware detection
cost function