Devi, B S Kiruthika; Subbulakshmi, T.; Babu, KV Mahesh - In: International Journal of Information Security and … 12 (2018) 3, pp. 123-140
security model, using a Hierarchical Attack Representation Model (HARM), to compare and access the effectiveness of the …