Login / Signup
Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment.
Adedayo Oyelakin Adetoye
Sadie Creese
Michael Goldsmith
Published in:
CRITIS (2012)
Keyphrases
</>
structural information
data sets
information sources
information seeking
social networks
information systems
case study
keywords
wide range
end users
higher level
information processing
contextual information
information security
raw data