A structured approach for implementing cyber security exercises.
Autor: | Furtuna?, A., Patriciu, V.-V., Bica, I. |
---|---|
Zdroj: | 2010 8th International Conference on Communications (COMM); 2010, p415-418, 4p |
Databáze: | Complementary Index |
Externí odkaz: |
Autor: | Furtuna?, A., Patriciu, V.-V., Bica, I. |
---|---|
Zdroj: | 2010 8th International Conference on Communications (COMM); 2010, p415-418, 4p |
Databáze: | Complementary Index |
Externí odkaz: |