A two-constraint approach to risky cybersecurity experiment management. Wroclawski, J., Mirkovic, J., Faber, T., & Schwab, S. In Invited paper at the Sarnoff Symposium, 2008.
bibtex   
@inproceedings{wroclawski2008two,
  title={A two-constraint approach to risky cybersecurity experiment management},
  author={Wroclawski, John and Mirkovic, Jelena and Faber, Ted and Schwab, Stephen},
  booktitle={Invited paper at the Sarnoff Symposium},
  year={2008}
}

Downloads: 0