Considering Internal Vulnerabilities and the Attacker's Knowledge to Model the Impact of Cyber Events as Geometrical Prisms Conference Paper uri icon

start page

  • 340

end page

  • 348