[RDF data]
Home | Example Publications
PropertyValue
dcterms:bibliographicCitation <http://dblp.uni-trier.de/rec/bibtex/conf/uss/DykstraFDVWJ19>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Amanda_Johnson>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Dawn_Varva>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Josiah_Dykstra>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Linda_Wilk>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Matt_Fante>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Paul_Donahue>
foaf:homepage <https://www.usenix.org/conference/cset19/presentation/dykstra>
dc:identifier DBLP conf/uss/DykstraFDVWJ19 (xsd:string)
dcterms:issued 2019 (xsd:gYear)
rdfs:label Lessons from Using the I-Corps Methodology to Understand Cyber Threat Intelligence Sharing. (xsd:string)
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Amanda_Johnson>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Dawn_Varva>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Josiah_Dykstra>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Linda_Wilk>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Matt_Fante>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Paul_Donahue>
dcterms:partOf <https://dblp.l3s.de/d2r/resource/publications/conf/uss/2019cset>
owl:sameAs <http://bibsonomy.org/uri/bibtexkey/conf/uss/DykstraFDVWJ19/dblp>
owl:sameAs <http://dblp.rkbexplorer.com/id/conf/uss/DykstraFDVWJ19>
rdfs:seeAlso <http://dblp.uni-trier.de/db/conf/uss/cset2019.html#DykstraFDVWJ19>
rdfs:seeAlso <https://www.usenix.org/conference/cset19/presentation/dykstra>
swrc:series <https://dblp.l3s.de/d2r/resource/conferences/uss>
dc:title Lessons from Using the I-Corps Methodology to Understand Cyber Threat Intelligence Sharing. (xsd:string)
dc:type <http://purl.org/dc/dcmitype/Text>
rdf:type swrc:InProceedings
rdf:type foaf:Document