Cited By
View all- Song IJeon SKim DLee MSeo J(2024)GENICS: A Framework for Generating Attack Scenarios for Cybersecurity Exercises on Industrial Control SystemsApplied Sciences10.3390/app1402076814:2(768)Online publication date: 16-Jan-2024
- Li TLiu XQiao WZhu XShen YMa J(2024)T-Trace: Constructing the APTs Provenance Graphs Through Multiple Syslogs CorrelationIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.327391821:3(1179-1195)Online publication date: May-2024
- Katsis CJin XSang FSun JBertino EKompella RKundu A(2024)Graphene: Towards Data-driven Holistic Security Posture Analysis using AI-generated Attack Graphs2024 IEEE 10th International Conference on Collaboration and Internet Computing (CIC)10.1109/CIC62241.2024.00012(9-18)Online publication date: 28-Oct-2024
- Show More Cited By