Article,

Cybersecurity Strategies: The QuERIES Methodology.

, , and .
Computer, 41 (8): 20-26 (2008)

Meta data

Tags

Users

  • @dblp

Comments and Reviews