Vol-3788⫷ Vol-3789 ⫸Vol-3790
urn:nbn:de:0074-3789-0


Vol-3789/Paper3⫷Vol-3789/Paper4⫸Vol-3789/Paper5

Emulating Attack Techniques to Improve Security Posture of an Active Directory Managed Infrastructure