<Record><identifier xmlns="http://purl.org/dc/elements/1.1/">URN:NBN:SI:doc-PYFTMDS9</identifier><date>2010</date><creator>Kiekintveld, Christopher</creator><creator>Tambe, Milind</creator><creator>Taylor, Matthew E.</creator><creator>Western, Craig</creator><relation>documents/doc/P/URN_NBN_SI_doc-PYFTMDS9_001.pdf</relation><relation>documents/doc/P/URN_NBN_SI_doc-PYFTMDS9_001.txt</relation><format format_type="issue">2</format><format format_type="volume">34</format><format format_type="type">article</format><format format_type="extent">str. 129-239</format><identifier identifier_type="ISSN">0350-5596</identifier><identifier identifier_type="COBISSID">24155431</identifier><identifier identifier_type="URN">URN:NBN:SI:doc-PYFTMDS9</identifier><language>eng</language><publisher>Slovensko društvo Informatika</publisher><source>Informatica (Ljubljana)</source><rights>InC</rights><subject language_type_id="slv">informatika</subject><subject language_type_id="eng">information science</subject><subject language_type_id="eng">security</subject><subject language_type_id="slv">teorija iger</subject><subject language_type_id="slv">varnost</subject><subject language_type_id="slv">vrednotenje</subject><title>A framework for evaluating deployed security systems</title><title>is there a chink in your ARMOR?</title></Record>