Search for persons
X
?
Advances in Intelligent Systems and Computing; Advances in Computational Intelligence Systems ,
1
Cyberattack Analysis Utilising Attack Tree with Weighted Me..:
, In:
?
Advances in Intelligent Systems and Computing; Advances in Computational Intelligence Systems ,
2
Cyberattack Analysis Based on Attack Tree with Weighted Ave..:
, In:
?
3
Advances in Computational Intelligence Systems: Contributio..
Advances in Intelligent Systems and Computing, 1453
?
Advances in Intelligent Systems and Computing; Advances in Computational Intelligence Systems ,
4
Analysing Cyberattacks Using Attack Tree and Fuzzy Rules:
, In:
?
2023 IEEE International Conference on ICT in Business Industry & Government (ICTBIG) ,
5
Fuzzy Attack Tree: Assessing Cyberattack Risk Using Attack ..:
, In:
?
2023 IEEE International Conference on ICT in Business Industry & Government (ICTBIG) ,
7
An Introduction to Gossip Protocol Based Learning in Peer-t..:
, In:
?
Building the Future Internet through FIRE ,
10
Cross-Domain Interoperability Using Federated Interoperable..:
, In:
?
2022 IEEE International Symposium on Systems Engineering (ISSE) ,
11
Comparing Attack Models for IT Systems: Lockheed Martin's C..:
, In:
?
War and art / Mor Presiado, Frank Jacob (eds.)
13
The counter-archive and the destroyed body in the work of T..:
, In:Copies:
Zentrale:E03 a hit 002 1g/100