Research Article
Focusing on the Weakest Link: A Similarity Analysis on Phishing Campaigns Based on the ATT&CK Matrix
Figure 2
Vectorization of Tactic Initial Access. When techniques of Phishing and Supply Chain Compromise are used, they are expressed as 1. On the other hand, unused techniques are expressed as 0.