Threats Hidden in Office Network: Mechanism of Credential Harvesting for Lateral Movement.

Tung-Lin LeeI-Hsien LiuChu-Fen LiJung-Shian Li
Published in: J. Robotics Netw. Artif. Life (2021)
Keyphrases
  • peer to peer
  • wireless sensor networks
  • network structure
  • network traffic
  • computer networks
  • communication networks
  • security protection
  • network model
  • microsoft office
  • social network analysis