Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-06-25ContextisConnor Scott
Zoom In: Emulating 'Exploit Purchase' in Simulated Targeted Attacks