Jonny Milliken, Alan Marshall. The Threat-Victim Table - A Security Prioritisation Framework For Diverse WLAN Network Topographies. In Sokratis K. Katsikas, Pierangela Samarati, editors, SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications. pages 37-42, SciTePress, 2010.
@inproceedings{MillikenM10, title = {The Threat-Victim Table - A Security Prioritisation Framework For Diverse WLAN Network Topographies}, author = {Jonny Milliken and Alan Marshall}, year = {2010}, tags = {security}, researchr = {https://researchr.org/publication/MillikenM10}, cites = {0}, citedby = {0}, pages = {37-42}, booktitle = {SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, publisher = {SciTePress}, isbn = {978-989-8425-18-8}, }