Publication

Employing Attack Graphs for Intrusion Detection