Login / Signup
Attack-Deterring and Damage-Control Investments in Cybersecurity.
Wing Man Wynne Lam
Published in:
WEIS (2015)
Keyphrases
</>
control system
information technology
damage assessment
control method
control theory
information retrieval
access control
mathematical model
control problems
detection mechanism