Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment
Main Authors: | , , |
---|---|
Format: | Conference item |
Published: |
LNCS
2012
|
_version_ | 1797082342581338112 |
---|---|
author | Adetoye, A Creese, S Goldsmith, M |
author_facet | Adetoye, A Creese, S Goldsmith, M |
author_sort | Adetoye, A |
collection | OXFORD |
description | |
first_indexed | 2024-03-07T01:26:49Z |
format | Conference item |
id | oxford-uuid:924476de-18c9-48cb-a249-b216191a32fd |
institution | University of Oxford |
last_indexed | 2024-03-07T01:26:49Z |
publishDate | 2012 |
publisher | LNCS |
record_format | dspace |
spelling | oxford-uuid:924476de-18c9-48cb-a249-b216191a32fd2022-03-26T23:24:13ZReasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range ExperimentConference itemhttp://purl.org/coar/resource_type/c_5794uuid:924476de-18c9-48cb-a249-b216191a32fdDepartment of Computer ScienceLNCS2012Adetoye, ACreese, SGoldsmith, M |
spellingShingle | Adetoye, A Creese, S Goldsmith, M Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment |
title | Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment |
title_full | Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment |
title_fullStr | Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment |
title_full_unstemmed | Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment |
title_short | Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment |
title_sort | reasoning about vulnerabilities in dependent information infrastructures a cyber range experiment |
work_keys_str_mv | AT adetoyea reasoningaboutvulnerabilitiesindependentinformationinfrastructuresacyberrangeexperiment AT creeses reasoningaboutvulnerabilitiesindependentinformationinfrastructuresacyberrangeexperiment AT goldsmithm reasoningaboutvulnerabilitiesindependentinformationinfrastructuresacyberrangeexperiment |