Sign in

Evaluating practitioner cyber-security attack graph configuration preferences.

Harjinder Singh LallieKurt DebattistaJay Bal
Published in: Comput. Secur. (2018)
Keyphrases