John Wroclawski

A two-constraint approach to risky cybersecurity experiment management

TitleA two-constraint approach to risky cybersecurity experiment management
Publication TypeConference Paper
Year of Publication2008
AuthorsJ. Wroclawski, J. Mirkovic, T. Faber, and S. Schwab
Conference Name2008 IEEE Sarnoff Symposium
Date PublishedApril
Conference LocationPrinceton, NJ, US
Groups: