Digital representation of a zero-day exploit spreading through networks in a cyber environment perspective
Keywords
digital,
exploit,
spreading,
network,
representation,
perspective,
cyber,
pattern,
privacy,
monitoring,
evolution,
communication,
software,
intelligence,
coding,
identification,
risk,
maintenance,
research,
innovation,
support,
strategy,
attack,
system,
analysis,
infrastructure,
security,
application,
awareness,
automation,
information,
datum,
tool,
solution,
response,
threat,
compliance,
integrity,
dynamic,
breach,
detection,
design,
architecture