Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2021.3117348
Abstract: Ideal cyber threat intelligence (CTI) includes insights into attacker strategies that are specific to a network under observation. Such CTI currently requires extensive expert input for obtaining, assessing, and correlating system vulnerabilities into a graphical…
read more here.
Keywords:
attack graph;
graph generation;
generation using;
driven attack ... See more keywords