Inproceedings,

Simulation-based optimization of information security controls: An adversary-centric approach.

, , , , and .
Winter Simulation Conference, page 2054-2065. IEEE, (2013)

Meta data

Tags

Users

  • @dblp

Comments and Reviews