K Demertzis, K Tsiknas, D Takezis, C Skianis, L Iliadis - 2021 - scholar.archive.org
Attackers are perpetually modifying their tactics to avoid detection and frequently leverage
legitimate credentials with trusted tools already deployed in a network environment, making …