Login / Signup

HARM: Hacker Attack Representation Method.

Péter KárpátiAndreas L. OpdahlGuttorm Sindre
Published in: ICSOFT (Selected Papers) (2010)
Keyphrases