Description
This artifact permits to reproduce the experimental results obtained with the techniques and algorithms presented in the paper "How hard can it be? Quantifying MITRE attack campaigns with attack trees and cATM logic" by Nicoletti et al. (to appear). The contents include the dataset and the algorithms used in the presented method, to perform quantitative comparisons of MITRE ATT&CK Enterprise Campaigns—see https://attack.mitre.org/campaigns/.
Date made available | 20 Nov 2024 |
---|---|
Publisher | Zenodo |