The Threat-Victim Table - A Security Prioritisation Framework For Diverse WLAN Network Topographies

Jonny Milliken, Alan Marshall. The Threat-Victim Table - A Security Prioritisation Framework For Diverse WLAN Network Topographies. In Sokratis K. Katsikas, Pierangela Samarati, editors, SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications. pages 37-42, SciTePress, 2010.

Abstract

Abstract is missing.