Author:
Wang Lei,Sun Li,Shang Duo,He Huihong,Nie Guangtao,Dong Haikuo
Reference22 articles.
1. https://cve.mitre.org/
2. https://attack.mitre.org/
3. Utilizing attack enumerations to study SDN/NFV vulnerabilities[C];Dang,2018
4. Threatzoom: neural network for automated vulnerability mitigation[C];Aghaei,2019
5. Mining known attack patterns from security-related events