[Lecture Notes in Computer Science] Computer Security – ESORICS 2005 Volume 3679 || Using Attack Trees to Identify Malicious Attacks from Authorized Insiders
di Vimercati, Sabrina de Capitani, Syverson, Paul, Gollmann, DieterVolume:
10.1007/11
Year:
2005
Language:
english
DOI:
10.1007/11555827_14
File:
PDF, 403 KB
english, 2005