Articles with "driven attack" as a keyword



Photo by goumbik from unsplash

Alert-Driven Attack Graph Generation Using S-PDFA

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2021.3117348

Abstract: Ideal cyber threat intelligence (CTI) includes insights into attacker strategies that are specific to a network under observation. Such CTI currently requires extensive expert input for obtaining, assessing, and correlating system vulnerabilities into a graphical… read more here.

Keywords: attack graph; graph generation; generation using; driven attack ... See more keywords