Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/wisa/LeeKY15
%A Lee, Eunchong
%A Kim, Hyunsoo
%A Yoon, Ji Won
%B WISA
%D 2015
%E Kim, Howon
%E Choi, Dooho
%I Springer
%K dblp
%P 187-199
%T Various Threat Models to Circumvent Air-Gapped Systems for Preventing Network Attack.
%U http://dblp.uni-trier.de/db/conf/wisa/wisa2015.html#LeeKY15
%V 9503
%@ 978-3-319-31874-5
@inproceedings{conf/wisa/LeeKY15,
added-at = {2017-05-21T00:00:00.000+0200},
author = {Lee, Eunchong and Kim, Hyunsoo and Yoon, Ji Won},
biburl = {https://www.bibsonomy.org/bibtex/252be2c3a499fb4fe2de0da48b5d5fa31/dblp},
booktitle = {WISA},
crossref = {conf/wisa/2015},
editor = {Kim, Howon and Choi, Dooho},
ee = {https://doi.org/10.1007/978-3-319-31875-2_16},
interhash = {9fd2601f02db2002301526b284088563},
intrahash = {52be2c3a499fb4fe2de0da48b5d5fa31},
isbn = {978-3-319-31874-5},
keywords = {dblp},
pages = {187-199},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2024-04-09T20:40:50.000+0200},
title = {Various Threat Models to Circumvent Air-Gapped Systems for Preventing Network Attack.},
url = {http://dblp.uni-trier.de/db/conf/wisa/wisa2015.html#LeeKY15},
volume = 9503,
year = 2015
}