Login / Signup
Attack tree based information security risk assessment method integrating enterprise objectives with vulnerabilities.
Bugra Karabey
Nazife Baykal
Published in:
Int. Arab J. Inf. Technol. (2013)
Keyphrases
</>
historical data
information sharing
countermeasures