Extracting and Evaluating Similar and Unique Cyber Attack Strategies from Intrusion Alerts
Keyword(s):
2012 ◽
Vol 132
(6)
◽
pp. 344-348
◽
Keyword(s):
2019 ◽
Vol 7
(1)
◽
pp. 14-26