Author:
Ammann Paul,Wijesekera Duminda,Kaushik Saket
Cited by
319 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Red Team automated testing modeling and online planning method for post-penetration;Computers & Security;2024-09
2. Navigating the Threat Landscape in the Metaverse;Advances in Information Security, Privacy, and Ethics;2024-08-21
3. A Metalanguage for Dynamic Attack Graphs and Lazy Generation;Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30
4. IoTHaven: An Online Defense System to Mitigate Remote Injection Attacks in Trigger-action IoT Platforms;2024 IEEE 30th International Symposium on Local and Metropolitan Area Networks (LANMAN);2024-07-10
5. Game-Theoretic Method for Optimal Initial Allocation of Honeypots for Enhanced Network Security;2024 International Conference on Smart Applications, Communications and Networking (SmartNets);2024-05-28