-
-
-
-
A multi-step attack-correlation method with privacy protection
... combines a privacy-preserving technique and a multi-step attack-correlation method to better balance the privacy and ... . This algorithm is used to construct multistep attack scenarios by discovering sequential attack-behavior patterns. It analyzes the time ...
-
-
-
-
-
-
-
-