Cyberterrorism: Postmodern State of Chaos
Information Security Journal: A Global Perspective
Security compliance: the next frontier in security research
Proceedings of the 2008 workshop on New security paradigms
Formal approach to security metrics.: what does "more secure" mean for you?
Proceedings of the Fourth European Conference on Software Architecture: Companion Volume
Towards micro architecture for security adaptation
Proceedings of the Fourth European Conference on Software Architecture: Companion Volume
Applicability of security metrics for adaptive security management in a universal banking hub system
Proceedings of the Fourth European Conference on Software Architecture: Companion Volume
Security implications of selective encryption
Proceedings of the 6th International Workshop on Security Measurements and Metrics
An approach based on citation analysis to support effective handling of regulatory compliance
Future Generation Computer Systems
Formal analysis of security metrics and risk
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
Privacy-friendly business models for location-based mobile
Journal of Theoretical and Applied Electronic Commerce Research
Model-based qualitative risk assessment for availability of IT infrastructures
Software and Systems Modeling (SoSyM)
Can we measure security and how?
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
Towards metrics-driven adaptive security management in e-health IoT applications
Proceedings of the 7th International Conference on Body Area Networks
Proceedings of the International Conference on Management of Emergent Digital EcoSystems
Proceedings of the International Workshop on Adaptive Security
Hi-index | 0.00 |