A simulation environment for cybersecurity attack analysis based on network traffic logs
2013 ◽
Vol E96.A
(8)
◽
pp. 1723-1729
Keyword(s):
2019 ◽
Vol 7
(5)
◽
pp. 912-915
Keyword(s):