Communications of the ACM
Information Processing and Human-Machine Interaction: An Approach to Cognitive Engineering
Information Processing and Human-Machine Interaction: An Approach to Cognitive Engineering
Vulnerability Assessment Simulation for Information Infrastructure Protection
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
Autonomic defense: thwarting automated attacks via real-time feedback control
Complexity - Special issue: Resilient and adaptive defense of computing networks
A symptom-based taxonomy for an early detection of network attacks
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
System specification based network modeling for survivability testing simulation
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Cybersecurity for critical infrastructures: attack and defense modeling
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Modeling active cyber attack for network vulnerability assessment
ISPA'06 Proceedings of the 2006 international conference on Frontiers of High Performance Computing and Networking
Vulnerability modeling and simulation for DNS intrusion tolerance system construction
AIS'04 Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems
A predictive defense system for the smart grid
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
Hi-index | 48.22 |