Search Results for author: Hadar Polad

Found 1 papers, 1 papers with code

Attack Graph Obfuscation

1 code implementation6 Mar 2019 Rami Puzis, Hadar Polad, Bracha Shapira

Before executing an attack, adversaries usually explore the victim's network in an attempt to infer the network topology and identify vulnerabilities in the victim's servers and personal computers.

Combinatorial Optimization

Cannot find the paper you are looking for? You can Submit a new open access paper.