Methodology for analyzing the compromise of a deployed tactical network.

Autor: Asman, B.C., Kim, M.H., Moschitto, R.A., Stauffer, J.C., Huddleston, S.H.
Zdroj: 2011 IEEE Systems & Information Engineering Design Symposium (SIEDS); 2011, p164-169, 6p
Databáze: Complementary Index