no code implementations • 27 May 2022 • Seok Bin Son, Soohyun Park, Haemin Lee, Joongheon Kim, Soyi Jung, Donghwa Kim
In the literature of modern network security research, deriving effective and efficient course-of-action (COA) attach search methods are of interests in industry and academia.