Using Attack and Protection Trees to Analyze Threats and Defenses to Homeland Security

Author(s):  
Kenneth Edge ◽  
George Dalton ◽  
Richard Raines ◽  
Robert Mills
2004 ◽  
Author(s):  
Christopher B. Mayhorn ◽  
Michael S. Wogalter ◽  
Jennifer L. Bell
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document