Subject
Law,General Computer Science
Reference97 articles.
1. Merging datasets of CyberSecurity incidents for fun and insight;Abbiati;Front. Big Data,2021
2. A review of insider threat detection: classification, machine learning techniques, datasets, open challenges, and recommendations;Al-Mhiqani;Appl. Sci.,2020
3. Time-efficient and cost-effective network hardening using attack graphs;Albanese,2012
4. Scalable, graph-based network vulnerability analysis;Ammann,2002
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献