Zobrazeno 1 - 2
of 2
pro vyhledávání: '"Hodaya Binyamini"'
Autor:
Edita Grolman, Hodaya Binyamini, Asaf Shabtai, Yuval Elovici, Ikuya Morikawa, Toshiya Shimizu
Publikováno v:
Proceedings of the 30th ACM Conference on User Modeling, Adaptation and Personalization.
Publikováno v:
KDD
Attack graphs are one of the main techniques used to automate the cybersecurity risk assessment process. In order to derive a relevant attack graph, up-to-date information on known cyber attack techniques should be represented as interaction rules. H