Searched for: subject%3A%22modelling%22
(1 - 1 of 1)
document
Nadeem, A. (author), Verwer, S.E. (author), Moskal, Stephen (author), Yang, Shanchieh Jay (author)
Ideal cyber threat intelligence (CTI) includes insights into attacker strategies that are specific to a network under observation. Such CTI currently requires extensive expert input for obtaining, assessing, and correlating system vulnerabilities into a graphical representation, often referred to as an attack graph (AG). Instead of deriving AGs...
journal article 2022