"Using Attack Trees to Identify Malicious Attacks from Authorized Insiders."

Indrajit Ray, Nayot Poolsapassit (2005)

Details and statistics

DOI: 10.1007/11555827_14

access: open

type: Conference or Workshop Paper

metadata version: 2019-08-20

a service of  Schloss Dagstuhl - Leibniz Center for Informatics