000 00720cam a2200133 4500
100 1 _aBUCHANAN
245 _aThe life cycles of cyber threats/
_cBen Buchanan
260 _c2016
520 _aThe article highlights the vulnerabilities and exploits, techiniques and operational concepts. The applicability of life cycle analysis to cyber security is not limited to software vulnerabilities and exploits. It can be applied to specific techiniques as well as to broader operational concepts.
650 _aTECHNOLOGY
_xCYBER THREATS
773 _aSurvival:
_gVol.58, No.1, February-March 2016, pp.39-58 (106)
856 _uhttp://dx.doi.org/10.1080/00396338.2016.1142093
_z click here for text
945 _i46663-1001
_rY
_sY
999 _c31139
_d31139