Abstract: Postulating the behavior of attackers is important in the design of cybersecurity protection measures. Attack graph is a technique employed for this purpose, which aids in identifying and ...
Abstract: The recommendation algorithm based on KG can capture rich semantic and structural information and analyze user preferences more accurately, which is becoming the latest technology of ...