Author:
Bohara Atul,Noureddine Mohammad A.,Fawaz Ahmed,Sanders William H.
Cited by
45 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Reinforcement learning-based autonomous attacker to uncover computer network vulnerabilities;Neural Computing and Applications;2024-05-07
2. Predicting and Visualizing Lateral Movements Based on ATT&CK and Quantification Theory Type 3;Journal of Cases on Information Technology;2024-03-20
3. Detecting lateral movement: A systematic survey;Heliyon;2024-02
4. HLMD: Detecting Lateral Movement Using Heterogeneous Graph Model;2023 IEEE International Conference on High Performance Computing & Communications, Data Science & Systems, Smart City & Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys);2023-12-17
5. Malicious Lateral Movement in 5G Core With Network Slicing And Its Detection;2023 33rd International Telecommunication Networks and Applications Conference;2023-11-29