Investigating Computer Attacks Using Attack Trees

doi 10.1007/978-0-387-73742-3_23
Full Text
Abstract

Available in full text

Date

Unknown

Authors
Publisher

Springer New York