The study explores the risks and tradeoffs when adapting enterprise-IT security and zero trust principles to weapon systems.
CERT Insider Threat Center, T., 2010: Welcome to the Insider Threat Blog. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed ...