Login / Signup
Attack Graph Obfuscation.
Hadar Polad
Rami Puzis
Bracha Shapira
Published in:
CSCML (2017)
Keyphrases
</>
attack graph
attack graphs
enterprise network
reverse engineering
alert correlation
network configuration
static analysis
malware detection
neural network
cost function