A two-constraint approach to risky cybersecurity experiment management. Wroclawski, J., Mirkovic, J., Faber, T., & Schwab, S. In Invited paper at the Sarnoff Symposium, 2008. bibtex @inproceedings{wroclawski2008two,
title={A two-constraint approach to risky cybersecurity experiment management},
author={Wroclawski, John and Mirkovic, Jelena and Faber, Ted and Schwab, Stephen},
booktitle={Invited paper at the Sarnoff Symposium},
year={2008}
}
Downloads: 0
{"_id":"Kkmeyee8BLxnqX3kd","bibbaseid":"wroclawski-mirkovic-faber-schwab-atwoconstraintapproachtoriskycybersecurityexperimentmanagement-2008","authorIDs":[],"author_short":["Wroclawski, J.","Mirkovic, J.","Faber, T.","Schwab, S."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","title":"A two-constraint approach to risky cybersecurity experiment management","author":[{"propositions":[],"lastnames":["Wroclawski"],"firstnames":["John"],"suffixes":[]},{"propositions":[],"lastnames":["Mirkovic"],"firstnames":["Jelena"],"suffixes":[]},{"propositions":[],"lastnames":["Faber"],"firstnames":["Ted"],"suffixes":[]},{"propositions":[],"lastnames":["Schwab"],"firstnames":["Stephen"],"suffixes":[]}],"booktitle":"Invited paper at the Sarnoff Symposium","year":"2008","bibtex":"@inproceedings{wroclawski2008two,\n title={A two-constraint approach to risky cybersecurity experiment management},\n author={Wroclawski, John and Mirkovic, Jelena and Faber, Ted and Schwab, Stephen},\n booktitle={Invited paper at the Sarnoff Symposium},\n year={2008}\n}\n\n","author_short":["Wroclawski, J.","Mirkovic, J.","Faber, T.","Schwab, S."],"key":"wroclawski2008two","id":"wroclawski2008two","bibbaseid":"wroclawski-mirkovic-faber-schwab-atwoconstraintapproachtoriskycybersecurityexperimentmanagement-2008","role":"author","urls":{},"metadata":{"authorlinks":{}},"downloads":0},"bibtype":"inproceedings","biburl":"https://bibbase.org/network/files/2WNBgwTRfefSKBGKb","creationDate":"2021-03-18T02:12:16.192Z","downloads":0,"keywords":[],"search_terms":["two","constraint","approach","risky","cybersecurity","experiment","management","wroclawski","mirkovic","faber","schwab"],"title":"A two-constraint approach to risky cybersecurity experiment management","year":2008,"dataSources":["EvE5YwRisenYKQGoy","r6GXK5Dq5k4HQPNPD","vYqi9BwPxyXvixzCT","yHpEE62vkupDqbGrG","Lc8KDmQn8RuDaFqeg","nxSyfTE8ojajS8Wcm","2Fkx7mpveyLCGzDsW","AkaMFtCqH6ZepCekt","smJny2HbQ4ct2q8T6","5ByepEgrvFujJFiRX"]}