Author:Grant, T; Burke, Ivan D; Van Heerden, Renier PDate:Mar 2012The purpose of this paper is to find, formalise, and compare models of the offensive cyber operations process available in the open scientific literature. Seven models were sufficiently well described for formalisation using Structured Analysis ...Read more