Selecting optimal countermeasures for attacks against critical systems using the attack volume model and the RORI index Academic Article uri icon

start page

  • 13

end page

  • 34

volume

  • 47