The Threat-Victim Table - A Security Prioritisation Framework For Diverse WLAN Network Topographies

Jonny Milliken, Alan Marshall. The Threat-Victim Table - A Security Prioritisation Framework For Diverse WLAN Network Topographies. In Sokratis K. Katsikas, Pierangela Samarati, editors, SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications. pages 37-42, SciTePress, 2010.

@inproceedings{MillikenM10,
  title = {The Threat-Victim Table - A Security Prioritisation Framework For Diverse WLAN Network Topographies},
  author = {Jonny Milliken and Alan Marshall},
  year = {2010},
  tags = {security},
  researchr = {https://researchr.org/publication/MillikenM10},
  cites = {0},
  citedby = {0},
  pages = {37-42},
  booktitle = {SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications},
  editor = {Sokratis K. Katsikas and Pierangela Samarati},
  publisher = {SciTePress},
  isbn = {978-989-8425-18-8},
}