2007
DOI: 10.1615/telecomradeng.v66.i15.80
|View full text |Cite
|
Sign up to set email alerts
|

The Use of the Threat Setting Method on a Set of Information Safety Primitive Attributes in Assessing Efficacy of Its Protection

Help me understand this report

This publication either has no citations yet, or we are still processing them

Set email alert for when this publication receives citations?

See others like this or search for similar articles