Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment

Bibliographic Details
Main Authors: Adetoye, A, Creese, S, Goldsmith, M
Format: Conference item
Published: LNCS 2012
_version_ 1797082342581338112
author Adetoye, A
Creese, S
Goldsmith, M
author_facet Adetoye, A
Creese, S
Goldsmith, M
author_sort Adetoye, A
collection OXFORD
description
first_indexed 2024-03-07T01:26:49Z
format Conference item
id oxford-uuid:924476de-18c9-48cb-a249-b216191a32fd
institution University of Oxford
last_indexed 2024-03-07T01:26:49Z
publishDate 2012
publisher LNCS
record_format dspace
spelling oxford-uuid:924476de-18c9-48cb-a249-b216191a32fd2022-03-26T23:24:13ZReasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range ExperimentConference itemhttp://purl.org/coar/resource_type/c_5794uuid:924476de-18c9-48cb-a249-b216191a32fdDepartment of Computer ScienceLNCS2012Adetoye, ACreese, SGoldsmith, M
spellingShingle Adetoye, A
Creese, S
Goldsmith, M
Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment
title Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment
title_full Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment
title_fullStr Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment
title_full_unstemmed Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment
title_short Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment
title_sort reasoning about vulnerabilities in dependent information infrastructures a cyber range experiment
work_keys_str_mv AT adetoyea reasoningaboutvulnerabilitiesindependentinformationinfrastructuresacyberrangeexperiment
AT creeses reasoningaboutvulnerabilitiesindependentinformationinfrastructuresacyberrangeexperiment
AT goldsmithm reasoningaboutvulnerabilitiesindependentinformationinfrastructuresacyberrangeexperiment