Author:
Moskal Stephen,Wheeler Ben,Kreider Derek,Kuhl Michael E.,Yang Shanchieh Jay
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Cyberattacker Profiles, Cyberattack Models and Scenarios, and Cybersecurity Ontology;Advances in Information Security;2023
2. Real Time Multistage Attack Detection Leveraging Machine Learning and MITRE Framework;2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART);2022-12-16
3. Reproducible and Adaptable Log Data Generation for Sound Cybersecurity Experiments;Annual Computer Security Applications Conference;2021-12-06
4. Session-level Adversary Intent-Driven Cyberattack Simulator;2020 IEEE/ACM 24th International Symposium on Distributed Simulation and Real Time Applications (DS-RT);2020-09
5. A Framework to Create a Virtual Cyber Battlefield for Cyber Maneuvers and Impact Assessment;Iranian Journal of Science and Technology, Transactions of Electrical Engineering;2019-01-08