Cited By
View all- Buchta RGkoktsis GHeine FKleiner C(2024)Advanced Persistent Threat Attack Detection Systems: A Review of Approaches, Challenges, and TrendsDigital Threats: Research and Practice10.1145/36960145:4(1-37)Online publication date: 17-Sep-2024
- Yang JYang MHan WZhang J(2024)A Survey on Attack GraphNetwork Simulation and Evaluation10.1007/978-981-97-4522-7_3(36-52)Online publication date: 2-Aug-2024
- Khemapech ISansrimahachai WToahchoodee M(2016)Leveraging data stream processing and weighted attack graph for real-time bridge structural monitoring and warning2016 TRON Symposium (TRONSHOW)10.1109/TRONSHOW.2016.7842881(1-9)Online publication date: Dec-2016
- Show More Cited By