Generating attack scenarios for the system security validation Academic Article uri icon

publication date

  • December 27, 2012

start page

  • 69

end page

  • 80

volume

  • 2

issue

  • 3-4