Network Security Modeling and Cyber Attack Simulation Methodology
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
SECUSIM: A Tool for the Cyber-Attack Simulation
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Public telephone network vulnerabilities
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Embedding information security curricula in existing programmes
Proceedings of the 1st annual conference on Information security curriculum development
Detailed DoS attacks in wireless networks and countermeasures
International Journal of Ad Hoc and Ubiquitous Computing
The role of information systems security: towards a more secure environment
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
Managing the risks of smarter planet solutions
IBM Journal of Research and Development
Automated cyber-attack scenario generation using the symbolic simulation
AIS'04 Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems
Linux-Based system modelling for cyber-attack simulation
AIS'04 Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems
Do Information Security Policies Reduce the Incidence of Security Breaches: An Exploratory Analysis
Information Resources Management Journal
Hi-index | 0.00 |