A General Theory of Composition for Trace Sets Closed under Selective Interleaving Functions
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
Under-specification, composition and emergent properties
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
A graph-based system for network-vulnerability analysis
Proceedings of the 1998 workshop on New security paradigms
Parsimonious downgrading and decision trees applied to the inference problem
Proceedings of the 1998 workshop on New security paradigms
Securing information transmission by redundancy
Proceedings of the 1999 workshop on New security paradigms
Conduit cascades and secure synchronization
Proceedings of the 2000 workshop on New security paradigms
Assessing the risk of intercepting VoIP calls
Computer Networks: The International Journal of Computer and Telecommunications Networking
Risk assessment in practice: A real case study
Computer Communications
Towards more secure systems: how to combine expert evaluations
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Risk-neutral evaluation of information security investment on data centers
Journal of Intelligent Information Systems
Hi-index | 0.01 |