Constructing Correlations in Attack Connection Chains Using Active Perturbation
2005 ◽
pp. 252-260