AMBRA: automated model-based risk analysis
Proceedings of the 2007 ACM workshop on Quality of protection
A methodology to minimise excessively permissive security configurations
ACS'08 Proceedings of the 8th conference on Applied computer scince
Adversarial security: getting to the root of the problem
iNetSec'10 Proceedings of the 2010 IFIP WG 11.4 international conference on Open research problems in network security
Requirements trade-offs analysis in the absence of quantitative measures: a heuristic method
Proceedings of the 2011 ACM Symposium on Applied Computing
Comparing alternatives for analyzing requirements trade-offs - In the absence of numerical data
Information and Software Technology
Risk communication design: video vs. text
PETS'12 Proceedings of the 12th international conference on Privacy Enhancing Technologies
Hi-index | 0.00 |