Sign in

Attack Graph Obfuscation.

Hadar PoladRami PuzisBracha Shapira
Published in: CSCML (2017)
Keyphrases
  • attack graph
  • attack graphs
  • enterprise network
  • reverse engineering
  • alert correlation
  • network configuration
  • static analysis
  • malware detection
  • neural network
  • cost function