Methodology for analyzing the compromise of a deployed tactical network.
Autor: | Asman, B.C., Kim, M.H., Moschitto, R.A., Stauffer, J.C., Huddleston, S.H. |
---|---|
Zdroj: | 2011 IEEE Systems & Information Engineering Design Symposium (SIEDS); 2011, p164-169, 6p |
Databáze: | Complementary Index |
Externí odkaz: |