A Graph Theoretical Methodology for Network Intrusion Fingerprinting and Attack Attribution

Chuck Easttom. A Graph Theoretical Methodology for Network Intrusion Fingerprinting and Attack Attribution. In Kohei Arai, editor, Intelligent Computing - Proceedings of the 2022 Computing Conference, Volume 3, SAI 2022, Virtual Event, 14-15 July 2022. Volume 508 of Lecture Notes in Networks and Systems, pages 550-580, Springer, 2022. [doi]

Abstract

Abstract is missing.