Results 241 to 250 of about 257,742 (291)
Physics-Aware Spatiotemporal Consistency for Transferable Defense of Autonomous Driving Perception. [PDF]
Liu Y +7 more
europepmc +1 more source
Understanding mental health discourse on Reddit with transformers and explainability. [PDF]
Sánchez RodrÃguez I +6 more
europepmc +1 more source
Enhancing cybersecurity: A high-performance intrusion detection approach through boosting minority class recognition. [PDF]
Asry CEL +3 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2021
This chapter presents a review of the state of the art on attack graph generation methods and their respective models, a review of possible sources of vulnerability, weakness, and remediation information, a comparative analysis of 15 tools for attack graph generation, and a case study on the implementation of a production-ready system and its ...
Konstantinos-Panagiotis Grammatikakis +1 more
openaire +1 more source
This chapter presents a review of the state of the art on attack graph generation methods and their respective models, a review of possible sources of vulnerability, weakness, and remediation information, a comparative analysis of 15 tools for attack graph generation, and a case study on the implementation of a production-ready system and its ...
Konstantinos-Panagiotis Grammatikakis +1 more
openaire +1 more source
2019 European Intelligence and Security Informatics Conference (EISIC), 2019
In recent years, the perpetrators of cyber-attacks have been playing a dynamic cat and mouse game with cybersecurity analysts who try to trace the attack and reconstruct the attack steps. While analysts rely on alert correlations, machine learning, and advanced visualizations in order to come up with sound attack hypotheses, they primarily rely on ...
Aviad Elitzur +2 more
openaire +1 more source
In recent years, the perpetrators of cyber-attacks have been playing a dynamic cat and mouse game with cybersecurity analysts who try to trace the attack and reconstruct the attack steps. While analysts rely on alert correlations, machine learning, and advanced visualizations in order to come up with sound attack hypotheses, they primarily rely on ...
Aviad Elitzur +2 more
openaire +1 more source

