Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Journal Article
%1 journals/cryptologia/ShermanDNOPSHT18
%A Sherman, Alan T.
%A DeLatte, David
%A Neary, Michael
%A Oliva, Linda
%A Phatak, Dhananjay S.
%A Scheponik, Travis
%A Herman, Geoffrey L.
%A Thompson, Julia
%D 2018
%J Cryptologia
%K dblp
%N 4
%P 337-377
%T Cybersecurity: Exploring core concepts through six scenarios.
%U http://dblp.uni-trier.de/db/journals/cryptologia/cryptologia42.html#ShermanDNOPSHT18
%V 42
@article{journals/cryptologia/ShermanDNOPSHT18,
added-at = {2018-07-10T00:00:00.000+0200},
author = {Sherman, Alan T. and DeLatte, David and Neary, Michael and Oliva, Linda and Phatak, Dhananjay S. and Scheponik, Travis and Herman, Geoffrey L. and Thompson, Julia},
biburl = {https://www.bibsonomy.org/bibtex/2d8103d070e7fdee9555fe9f9401bdcc7/dblp},
ee = {https://doi.org/10.1080/01611194.2017.1362063},
interhash = {edd50f8a15464f05c00ecb2ef8254f27},
intrahash = {d8103d070e7fdee9555fe9f9401bdcc7},
journal = {Cryptologia},
keywords = {dblp},
number = 4,
pages = {337-377},
timestamp = {2018-07-11T11:46:05.000+0200},
title = {Cybersecurity: Exploring core concepts through six scenarios.},
url = {http://dblp.uni-trier.de/db/journals/cryptologia/cryptologia42.html#ShermanDNOPSHT18},
volume = 42,
year = 2018
}