Old Web
English
Sign In
Acemap
>
Paper
>
Cyber Operations Rapid Assessment (CORA): A Guide to Best Practices for Threat-Informed Cyber Security Operations
Cyber Operations Rapid Assessment (CORA): A Guide to Best Practices for Threat-Informed Cyber Security Operations
2015
Clem Skorupka
Lindsley Boiney
Keywords:
Risk management
Network security
cyber operations
Information exchange
Computer security
Vulnerability (computing)
Malware
rapid assessment
Computer science
Best practice
Correction
Source
Cite
Save
Machine Reading By IdeaReader
1
References
0
Citations
NaN
KQI
[]