HIGHLIGHTS
SUMMARY
The authors then employ the machine_learning and deep learning models for training the attack graph, which are created based on the vulnerability database, and generate the attack graph. The learning approach of the attack graph introduced in this paper can be defined as a multi-output learning problem, and various machine_learning and deep learning problems can be redefined as a multi-output learning problem. The data undergo the preprocessing stage so that they can be used by a machine_learning model. The data undergo the preprocessing stage so that they can be used by a . . .
If you want to have access to all the content you need to log in!
Thanks :)
If you don't have an account, you can create one here.