Search for persons
X
?
Proceedings of the 9th Annual Cyber and Information Security Research Conference ,
6
Quantifying availability in SCADA environments using the cy..:
, In:
?
Proceedings of the Second Kuwait Conference on e-Services and e-Systems ,
8
Defining and computing a value based cyber-security measure:
, In:
?
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research ,
10
Software requirements for a system to compute mean failure ..:
, In:
?
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research ,
11
Modeling stakeholder/value dependency through mean failure ..:
, In:
?
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies ,
15