Showing
1 - 1
results of
1
for search '
'
Skip to content
Home
Collections
High Impact Articles
Jawi Collection
Malay Medicine
Search Options
UiTM Open Access
Search by UiTM Scopus
Advanced Search
Search by Category
Discovery Service
Sources
UiTM Journals
List UiTM Journal in IR
Statistic
About
Open Access
Creative Commons Licenses
COKI | Malaysia Open Access
Report Technical
User Guide
Contact Us
Search Tips
FAQs
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Reset Filters
Suggested Topics:
Stealthy Attacks
Reset Filters
Show filters (1)
Suggested Topics:
Stealthy Attacks
Search Results
Suggested Topics within your search.
Suggested Topics within your search.
ATT&CK predictions
1
Cyber Attack Simulations
1
Defense Evaluation
1
Emulation
1
Endpoint Security Evaluation
1
Malware
1
Organizations
1
Payloads
1
Penetration Testing
1
Penetration testing
1
Security
1
Stealthy Attacks
Testing
1
Showing
1 - 1
results of
1
for search '
'
, query time: 0.16s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Towards Effective Evaluation of Cyber Defense: Threat Based Adversary Emulation Approach
by
Ajmal, A.B
,
Alam, M.
,
Khan, S.
,
Mehbodniya, A.
,
Waheed, A.
,
Webber, J.
Published 2023
Call Number:
Loading...
Located:
Loading...
View Fulltext in Publisher
View in Scopus
Article
Search Tools:
Get RSS Feed
—
Email this Search
Back
Narrow Search
Format
Article
1
Sources
List of Scopus
1
Collections
High Impact Journal
1
Author
Ajmal, A.B
1
Alam, M.
1
Khan, S.
1
Mehbodniya, A.
1
Waheed, A.
1
Webber, J.
1
Language
English
1
Year of Publication
From:
To:
Loading...