A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is
Early detection of the security incidents and correct forecasting of the attack development is the basis for the efficient and timely response to cyber threats. The development of the attack depends on future steps available to the attackers, their goals, and their motivation—that is, the attacker "profile" that defines the malefactor behaviour in the system. Usually, the "attacker profile" is a set of attacker's attributes—both inner such as motives and skills, and external such as existingdoi:10.3390/info11030168 fatcat:hhgj7dspynfwblsmblweq6bznm