Attack Detection Application with Attack Tree for Mobile System using Log Analysis
Crossref DOI link: https://doi.org/10.1007/s11036-018-1012-4
Published Online: 2018-01-20
Published Print: 2019-02
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Kim, Duhoe
Shin, Dongil
Shin, Dongkyoo
Kim, Yong-Hyun
Text and Data Mining valid from 2018-01-20
Article History
First Online: 20 January 2018