Found: 3
Select item for more details and to access through your institution.
Automated Mapping of Common Vulnerabilities and Exposures to MITRE ATT&CK Tactics.
- Published in:
- Information (2078-2489), 2024, v. 15, n. 4, p. 214, doi. 10.3390/info15040214
- By:
- Publication type:
- Article
CVE2ATT&CK: BERT-Based Mapping of CVEs to MITRE ATT&CK Techniques.
- Published in:
- Algorithms, 2022, v. 15, n. 9, p. 314, doi. 10.3390/a15090314
- By:
- Publication type:
- Article
HUNT: USING HONEYTOKENS TO UNDERSTAND AND INFLUENCE THE EXECUTION OF AN ATTACK.
- Published in:
- eLearning & Software for Education, 2017, v. 1, p. 511, doi. 10.12753/2066-026X-17-075
- By:
- Publication type:
- Article