"A requires/provides model for computer attacks."

Steven J. Templeton, Karl E. Levitt (2000)

Details and statistics

DOI: 10.1145/366173.366187

access: closed

type: Conference or Workshop Paper

metadata version: 2019-11-28

a service of  Schloss Dagstuhl - Leibniz Center for Informatics