Abstract: Postulating the behavior of attackers is important in the design of cybersecurity protection measures. Attack graph is a technique employed for this purpose, which aids in identifying and ...
Abstract: The recommendation algorithm based on KG can capture rich semantic and structural information and analyze user preferences more accurately, which is becoming the latest technology of ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results