@dblp

Integrating attacker behavior in IT security analysis: a discrete-event simulation approach.

, , , , and . Inf. Technol. Manag., 16 (3): 221-233 (2015)

Links and resources

Tags