Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment

Bibliographic Details
Main Authors: Adetoye, A, Creese, S, Goldsmith, M
Format: Conference item
Published: Springer Berlin Heidelberg 2013
_version_ 1826259849503047680
author Adetoye, A
Creese, S
Goldsmith, M
author_facet Adetoye, A
Creese, S
Goldsmith, M
author_sort Adetoye, A
collection OXFORD
description
first_indexed 2024-03-06T18:56:17Z
format Conference item
id oxford-uuid:11f46ef7-438a-434e-ba42-83f311ec3833
institution University of Oxford
last_indexed 2024-03-06T18:56:17Z
publishDate 2013
publisher Springer Berlin Heidelberg
record_format dspace
spelling oxford-uuid:11f46ef7-438a-434e-ba42-83f311ec38332022-03-26T10:05:06ZReasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range ExperimentConference itemhttp://purl.org/coar/resource_type/c_5794uuid:11f46ef7-438a-434e-ba42-83f311ec3833Department of Computer ScienceSpringer Berlin Heidelberg2013Adetoye, ACreese, SGoldsmith, M
spellingShingle Adetoye, A
Creese, S
Goldsmith, M
Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment
title Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment
title_full Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment
title_fullStr Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment
title_full_unstemmed Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment
title_short Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment
title_sort reasoning about vulnerabilities in dependent information infrastructures a cyber range experiment
work_keys_str_mv AT adetoyea reasoningaboutvulnerabilitiesindependentinformationinfrastructuresacyberrangeexperiment
AT creeses reasoningaboutvulnerabilitiesindependentinformationinfrastructuresacyberrangeexperiment
AT goldsmithm reasoningaboutvulnerabilitiesindependentinformationinfrastructuresacyberrangeexperiment