Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment
Hauptverfasser: | , , |
---|---|
Format: | Conference item |
Veröffentlicht: |
Springer Berlin Heidelberg
2013
|
_version_ | 1826259849503047680 |
---|---|
author | Adetoye, A Creese, S Goldsmith, M |
author_facet | Adetoye, A Creese, S Goldsmith, M |
author_sort | Adetoye, A |
collection | OXFORD |
description | |
first_indexed | 2024-03-06T18:56:17Z |
format | Conference item |
id | oxford-uuid:11f46ef7-438a-434e-ba42-83f311ec3833 |
institution | University of Oxford |
last_indexed | 2024-03-06T18:56:17Z |
publishDate | 2013 |
publisher | Springer Berlin Heidelberg |
record_format | dspace |
spelling | oxford-uuid:11f46ef7-438a-434e-ba42-83f311ec38332022-03-26T10:05:06ZReasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range ExperimentConference itemhttp://purl.org/coar/resource_type/c_5794uuid:11f46ef7-438a-434e-ba42-83f311ec3833Department of Computer ScienceSpringer Berlin Heidelberg2013Adetoye, ACreese, SGoldsmith, M |
spellingShingle | Adetoye, A Creese, S Goldsmith, M Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment |
title | Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment |
title_full | Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment |
title_fullStr | Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment |
title_full_unstemmed | Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment |
title_short | Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment |
title_sort | reasoning about vulnerabilities in dependent information infrastructures a cyber range experiment |
work_keys_str_mv | AT adetoyea reasoningaboutvulnerabilitiesindependentinformationinfrastructuresacyberrangeexperiment AT creeses reasoningaboutvulnerabilitiesindependentinformationinfrastructuresacyberrangeexperiment AT goldsmithm reasoningaboutvulnerabilitiesindependentinformationinfrastructuresacyberrangeexperiment |