Author:
Mink Martin,Greifeneder Rainer
Publisher
Springer Berlin Heidelberg
Reference20 articles.
1. Arce, I., McGraw, G.: Why attacking systems is a good idea (Guest Editors’ introduction). IEEE Security & Privacy 2(4), 17–19 (2004)
2. Arnett, K.P., Schmidt, M.B.: Busting the ghost in the machine. Communications of the ACM 48(8), 92–95 (2005)
3. Black Hat briefings, training and consulting, http://www.blackhat.com
4. Homepage CIPHER CTF, http://www.cipher-ctf.org/
5. Conti, G.: Why computer scientists should attend hacker conferences. Communications of the ACM 48(3), 23–24 (2005)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Gamifying ICS Security Training and Research;Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy;2017-11-03