@cwillems

Expressing an information security policy within a security simulation game

, and . Proceedings of the Sixth Workshop on Education in Computer Security, page 43-49. Monterey, USA, (2004)

Links and resources

Tags