Vol-2808⫷ Vol-2809 ⫸Vol-2810
urn:nbn:de:0074-2809-0


Vol-2809/WESPr-18_02⫷Vol-2809/WESPr-18_03⫸Vol-2809/WESPr-18_04

Restructuring Attack Trees to Identify Incorrect or Missing Relationships between Nodes