Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,317,636 papers from all fields of science
Search
Sign In
Create Free Account
Kill chain
The term kill chain was originally used as a military concept related to the structure of an attack; consisting of target identification, force…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
3 relations
Computer security
Information security
Broader (1)
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Cyber Kill Chain Defender for Smart Meters
M. Simonov
,
Fabrizio Bertone
,
Klodiana Goga
,
O. Terzo
Computational Intelligence in Security for…
2018
Corpus ID: 49396084
The transition to generation-led approach in Smart Grids assigns new roles to networked Demand-oriented Real-time Smart Meters…
Expand
2017
2017
Thinking about intrusion kill chains as mechanisms
Jonathan M. Spring
,
E. Hatleback
Journal of Cybersecurity
2017
Corpus ID: 46763081
We integrate two established modeling methods from disparate fields: mechanisms from the philosophy of science literature and…
Expand
2016
2016
Precision guided democracy : the American war on terror from catch and release to kill and capture
Kyle Hendrix
2016
Corpus ID: 157129182
2016
2016
Mitigating Data Exfiltration in SaaS Clouds
Duane Wilson
,
Jeffrey Avery
Journal of Business, Technology and Leadership
2016
Corpus ID: 603477
Existing processes and methods for incident handling are geared towards infrastructures and operational models that will be…
Expand
2016
2016
Implementing Microsoft Enhanced Mitigation Experience Toolkit in a corporate environment : Proof of Concept
Jukka Ruotsila
2016
Corpus ID: 63148549
Author Title Number of Pages Date Jukka Ruotsila Implementing Microsoft Enhanced Mitigation Experience Toolkit in a corporate…
Expand
2015
2015
Airpower In The Information Age: Embracing TCP/IP Within Airborne Networks
N. Stuckey
2015
Corpus ID: 114050573
Abstract : Given the challenges posed by the Anti-Access Area Denial (A2/AD) threat, it is crucial for the military to possess…
Expand
2012
2012
Transforming Airborne Command and Control and Intelligence, Surveillance, and Reconnaissance
Kouji P Gillis
2012
Corpus ID: 113559401
Abstract : For over a decade, the USAF has been looking for follow-on platforms to replace and transform the current airborne…
Expand
2011
2011
Use of Chemicals for Prevention and Control of Southern Pine Beetle Infestations
R. F. Billings
2011
Corpus ID: 82811121
The southern pine beetle (SPB) is a major threat to pine forests in the Southeastern United States, Mexico, and Central America…
Expand
2007
2007
Measuring kill chain performance in complex environments
S. James
,
A. Coutts
,
C. Stanford
,
F. Bowden
,
D. Bowley
SPIE Defense + Commercial Sensing
2007
Corpus ID: 108958229
Offensive Support (OS) modelling has generally not been implemented within a closed simulation in such a way that its…
Expand
Review
2004
Review
2004
Developing Coalition Interoperability
Marcus Krackowizer
2004
Corpus ID: 109878673
Abstract : The need to increase capability by improving effectiveness of existing and future assets is a consequence of many…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE