7 results on '"F., Boyer"'
Search Results
2. Empirical Estimates and Observations of 0Day Vulnerabilities.
3. Ideal Based Cyber Security Technical Metrics for Control Systems.
4. A scalable approach to attack graph generation.
5. Trajectory Deformation applied to Kinodynamic Motion Planning for a Realistic Car Model.
6. Quantitative Cyber Risk Reduction Estimation Methodology for a Small SCADA Control System.
7. Comparison Between a Prescribed and a Permissive Process in Computer Assisted Training in Decision Making.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.