Amanote Research
Register
Sign In
Investigating Computer Attacks Using Attack Trees
doi 10.1007/978-0-387-73742-3_23
Full Text
Open PDF
Abstract
Available in
full text
Date
Unknown
Authors
Nayot Poolsapassit
Indrajit Ray
Publisher
Springer New York