Sign in

Simulation-based optimization of information security controls: An adversary-centric approach.

Elmar KieslingChristine StraussAndreas EkelhartBernhard GrillChristian Stummer
Published in: WSC (2013)
Keyphrases