Search
Now showing items 1-1 of 1
Scalable attack modelling in support of security information and event management
(2014)
While assessing security on single devices can be performed using vulnerability assessment tools, modelling of more intricate attacks, which incorporate multiple steps on different machines, requires more advanced techniques. ...