×
2012
Study on the modeling and analyzing of the role-based threats in the cyberspace.
[DOI]
Yeli Hao
,
Shize Guo
,
Hong Zhao
,
Zhe Chen
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012