Cerca
Items 1-2 di 2
Malevolent Activities Detection and Cyber Range Scenarios Orchestration
(2018-06-08)
increasing availability of Internet accessible services driven by the di usion of
connected devices. The consequent exposition to cyber-threats demands for
suitable methodologies, techniques and tools allowing to adequately ...