The Threat-Victim Table: A security prioritisation framework for diverse WLAN network topographies

Jonny Milliken, Alan Marshall

Research output: Contribution to conferencePaper

3 Citations (Scopus)
Original languageEnglish
Pages1-6
Number of pages6
Publication statusPublished - Jul 2010
EventSecurity and Cryptography (SECRYPT), Proceedings of the 2010 International Conference on - Athens, Greece
Duration: 01 Jul 201001 Jul 2010

Conference

ConferenceSecurity and Cryptography (SECRYPT), Proceedings of the 2010 International Conference on
CountryGreece
CityAthens
Period01/07/201001/07/2010

Bibliographical note

ISSN: E-ISBN : 978-989-8425-18-8

Cite this