@dblp

Evaluating practitioner cyber-security attack graph configuration preferences.

, , and . Comput. Secur., (2018)

Links and resources

Tags