Multi-stage attackSituation evaluationNetwork securityIntention recognitionCausal analysis
This work is supported by the National Natural Science Foundation of ChinaFoundation of Science and Technology on Information Assurance Laboratory
61303074KJ-15-106
2019