Search for persons
X
?
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies ,
3
Quantifying security threats and their impact:
, In:
?
Proceedings of the 9th Annual Cyber and Information Security Research Conference ,
9
Quantifying availability in SCADA environments using the cy..:
, In:
?
Proceedings of the Second Kuwait Conference on e-Services and e-Systems ,
11
Defining and computing a value based cyber-security measure:
, In:
?
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research ,
13
Modeling stakeholder/value dependency through mean failure ..:
, In:
?
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research ,
14