Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Hodaya Binyamini"'
Autor:
Edita Grolman, Hodaya Binyamini, Asaf Shabtai, Yuval Elovici, Ikuya Morikawa, Toshiya Shimizu
Publikováno v:
Proceedings of the 30th ACM Conference on User Modeling, Adaptation and Personalization.
Publikováno v:
KDD
Attack graphs are one of the main techniques used to automate the cybersecurity risk assessment process. In order to derive a relevant attack graph, up-to-date information on known cyber attack techniques should be represented as interaction rules. H
Autor:
BITTON, RON1 ronbit@post.bgu.ac.il, MAMAN, NADAV1 nadavmam@post.bgu.ac.il, SINGH, INDERJEET2 inderjeet@nec.com, MOMIYAMA, SATORU2 satoru-momiyama@nec.com, ELOVICI, YUVAL1 elovici@bgu.ac.il, SHABTAI, ASAF1 shabtaia@bgu.ac.il
Publikováno v:
ACM Computing Surveys. Sep2023, Vol. 55 Issue 9, p1-36. 36p.
Autor:
LE, TRIET H. M.1 triet.h.le@adelaide.edu.au, CHEN, HUAMING1 huaming.chen@adelaide.edu.au, BABAR, M. ALI2 ali.babar@adelaide.edu.au
Publikováno v:
ACM Computing Surveys. Jun2023, Vol. 55 Issue 5, p1-39. 39p. 2 Diagrams, 11 Charts.
Publikováno v:
ACM Transactions on Software Engineering & Methodology; Sep2023, Vol. 32 Issue 5, p1-45, 45p