1] B. Genge, C. Siaterlis, and M. Hohenadel. AMICI: an assessment platform for multi-domain security experimentation on critica
![Cybersecurity: Medieval Witchcraft, Chimeras and The Hound of Hades | by Prof Bill Buchanan OBE | ASecuritySite: When Bob Met Alice | Jan, 2023 | Medium Cybersecurity: Medieval Witchcraft, Chimeras and The Hound of Hades | by Prof Bill Buchanan OBE | ASecuritySite: When Bob Met Alice | Jan, 2023 | Medium](https://miro.medium.com/max/1400/1*jlsyY2Xs_YwY1tw1aSEwHQ.png)
Cybersecurity: Medieval Witchcraft, Chimeras and The Hound of Hades | by Prof Bill Buchanan OBE | ASecuritySite: When Bob Met Alice | Jan, 2023 | Medium
1] A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr. Basic concepts and taxonomy of dependable and secure computing. IEE
![Comprehensive information security policy process model (Knapp et al.,... | Download Scientific Diagram Comprehensive information security policy process model (Knapp et al.,... | Download Scientific Diagram](https://www.researchgate.net/publication/315598756/figure/fig5/AS:480458531184640@1491561648035/Comprehensive-information-security-policy-process-model-Knapp-et-al-2009.png)