[RDF data]
Home | Example Publications
PropertyValue
dcterms:bibliographicCitation <http://dblp.uni-trier.de/rec/bibtex/journals/compsec/CohenPSGLRI98>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Cynthia_A._Phillips>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Fran_Rupley>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Fred_Cohen>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Laura_Painton_Swiler>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Patricia_Leary>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Richard_Isler>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Timothy_Gaylor>
foaf:homepage <http://dx.doi.org/doi.org%2F10.1016%2FS0167-4048%2898%2980312-X>
foaf:homepage <https://doi.org/10.1016/S0167-4048(98)80312-X>
dc:identifier DBLP journals/compsec/CohenPSGLRI98 (xsd:string)
dc:identifier DOI doi.org%2F10.1016%2FS0167-4048%2898%2980312-X (xsd:string)
dcterms:issued 1998 (xsd:gYear)
swrc:journal <https://dblp.l3s.de/d2r/resource/journals/compsec>
rdfs:label A cause and effect model of attacks on information systems : Some Analysis Based on That Model, and The Application of that Model for CyberWarfare in CID. (xsd:string)
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Cynthia_A._Phillips>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Fran_Rupley>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Fred_Cohen>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Laura_Painton_Swiler>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Patricia_Leary>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Richard_Isler>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Timothy_Gaylor>
swrc:number 3 (xsd:string)
swrc:pages 211-221 (xsd:string)
owl:sameAs <http://bibsonomy.org/uri/bibtexkey/journals/compsec/CohenPSGLRI98/dblp>
owl:sameAs <http://dblp.rkbexplorer.com/id/journals/compsec/CohenPSGLRI98>
rdfs:seeAlso <http://dblp.uni-trier.de/db/journals/compsec/compsec17.html#CohenPSGLRI98>
rdfs:seeAlso <https://doi.org/10.1016/S0167-4048(98)80312-X>
dc:title A cause and effect model of attacks on information systems : Some Analysis Based on That Model, and The Application of that Model for CyberWarfare in CID. (xsd:string)
dc:type <http://purl.org/dc/dcmitype/Text>
rdf:type swrc:Article
rdf:type foaf:Document
swrc:volume 17 (xsd:string)