Abstract
No abstract available.
Cited By
- (2017). Introducing cybernomics, Computers and Security, 65:C, (77-89), Online publication date: 1-Mar-2017.
- Caulfield T and Pym D Modelling and simulating systems security policy Proceedings of the 8th International Conference on Simulation Tools and Techniques, (9-18)
- Krautsevich L, Martinelli F and Yautsiukhin A Formal analysis of security metrics and risk Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication, (304-319)
- Krautsevich L, Lazouski A, Martinelli F and Yautsiukhin A Influence of attribute freshness on decision making in usage control Proceedings of the 6th international conference on Security and trust management, (35-50)
- Massacci F and Nguyen V Which is the right source for vulnerability studies? Proceedings of the 6th International Workshop on Security Measurements and Metrics, (1-8)
- Beautement A, Sasse M and Wonham M The compliance budget Proceedings of the 2008 New Security Paradigms Workshop, (47-58)
- Bodin L, Gordon L and Loeb M (2008). Information security and risk management, Communications of the ACM, 51:4, (64-68), Online publication date: 1-Apr-2008.
- Klempt P, Schmidpeter H, Sowa S and Tsinas L Business oriented information security management Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II, (1835-1852)
- Sveen F, Torres J and Sarriegi J Learning from your elders Proceedings of the 26th international conference on Computer Safety, Reliability, and Security, (224-237)
- Wu Q, Zhang H and Pu J Mitigating distributed denial-of-service attacks using network connection control charts Proceedings of the 2nd international conference on Scalable information systems, (1-4)
- Torres J, Sarriegi J, Santos J and Serrano N Managing information systems security Proceedings of the 9th international conference on Information Security, (530-545)