000 | 00720cam a2200133 4500 | ||
---|---|---|---|
100 | 1 | _aBUCHANAN | |
245 |
_aThe life cycles of cyber threats/ _cBen Buchanan |
||
260 | _c2016 | ||
520 | _aThe article highlights the vulnerabilities and exploits, techiniques and operational concepts. The applicability of life cycle analysis to cyber security is not limited to software vulnerabilities and exploits. It can be applied to specific techiniques as well as to broader operational concepts. | ||
650 |
_aTECHNOLOGY _xCYBER THREATS |
||
773 |
_aSurvival: _gVol.58, No.1, February-March 2016, pp.39-58 (106) |
||
856 |
_uhttp://dx.doi.org/10.1080/00396338.2016.1142093 _z click here for text |
||
945 |
_i46663-1001 _rY _sY |
||
999 |
_c31139 _d31139 |