The Threat-Victim Table: A security prioritisation framework for diverse WLAN network topographies
Data(s) |
01/07/2010
|
---|---|
Identificador | |
Idioma(s) |
eng |
Direitos |
info:eu-repo/semantics/restrictedAccess |
Fonte |
Milliken , J & Marshall , A 2010 , ' The Threat-Victim Table: A security prioritisation framework for diverse WLAN network topographies ' Paper presented at Security and Cryptography (SECRYPT), Proceedings of the 2010 International Conference on , Athens , Greece , 01/07/2010 - 01/07/2010 , pp. 1-6 . |
Tipo |
conferenceObject |