Found: 18
Select item for more details and to access through your institution.
The Work‐Averse Cyberattacker Model: Theory and Evidence from Two Million Attack Signatures.
- Published in:
- Risk Analysis: An International Journal, 2022, v. 42, n. 8, p. 1623, doi. 10.1111/risa.13732
- By:
- Publication type:
- Article
HIT4Mal: Hybrid image transformation for malware classification.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2020, v. 31, n. 11, p. 1, doi. 10.1002/ett.3789
- By:
- Publication type:
- Article
Selecting a Secure Cloud Provider—An Empirical Study and Multi Criteria Approach.
- Published in:
- Information (2078-2489), 2020, v. 11, n. 5, p. 261, doi. 10.3390/info11050261
- By:
- Publication type:
- Article
Who Should Pay for Interdependent Risk? Policy Implications for Security Interdependence Among Airports.
- Published in:
- Risk Analysis: An International Journal, 2020, v. 40, n. 5, p. 1001, doi. 10.1111/risa.13454
- By:
- Publication type:
- Article
IoT Security Configurability with Security-by-Contract.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 19, p. 4121, doi. 10.3390/s19194121
- By:
- Publication type:
- Article
A Server-Side JavaScript Security Architecture for Secure Integration of Third-Party Libraries.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/9629034
- By:
- Publication type:
- Article
TESTREX: a framework for repeatable exploits.
- Published in:
- International Journal on Software Tools for Technology Transfer, 2019, v. 21, n. 1, p. 105, doi. 10.1007/s10009-017-0474-1
- By:
- Publication type:
- Article
Security Events and Vulnerability Data for Cybersecurity Risk Estimation.
- Published in:
- Risk Analysis: An International Journal, 2017, v. 37, n. 8, p. 1606, doi. 10.1111/risa.12864
- By:
- Publication type:
- Article
Agency Problems and Airport Security: Quantitative and Qualitative Evidence on the Impact of Security Training.
- Published in:
- Risk Analysis: An International Journal, 2017, v. 37, n. 2, p. 372, doi. 10.1111/risa.12607
- By:
- Publication type:
- Article
An Empirical Methodology to Evaluate Vulnerability Discovery Models.
- Published in:
- IEEE Transactions on Software Engineering, 2014, v. 40, n. 12, p. 1147, doi. 10.1109/TSE.2014.2354037
- By:
- Publication type:
- Article
Do you really mean what you actually enforced?
- Published in:
- International Journal of Information Security, 2011, v. 10, n. 4, p. 239, doi. 10.1007/s10207-011-0137-2
- By:
- Publication type:
- Article
Generalized XML security views.
- Published in:
- International Journal of Information Security, 2009, v. 8, n. 3, p. 173, doi. 10.1007/s10207-008-0074-x
- By:
- Publication type:
- Article
How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns.
- Published in:
- Artificial Intelligence & Law, 2009, v. 17, n. 1, p. 1, doi. 10.1007/s10506-008-9067-3
- By:
- Publication type:
- Article
FROM HIPPOCRATIC DATABASES TO SECURE TROPOS:: A COMPUTER-AIDED RE-ENGINEERING APPROACH.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2007, v. 17, n. 2, p. 265, doi. 10.1142/S0218194007003239
- By:
- Publication type:
- Article
A Negotiation Scheme for Access Rights Establishment in Autonomic Communication.
- Published in:
- Journal of Network & Systems Management, 2007, v. 15, n. 1, p. 117, doi. 10.1007/s10922-006-9057-2
- By:
- Publication type:
- Article
Requirements engineering for trust management: model, methodology, and reasoning.
- Published in:
- International Journal of Information Security, 2006, v. 5, n. 4, p. 257, doi. 10.1007/s10207-006-0005-7
- By:
- Publication type:
- Article
An overview of the verification of SET.
- Published in:
- International Journal of Information Security, 2005, v. 4, n. 1/2, p. 17, doi. 10.1007/s10207-004-0047-7
- By:
- Publication type:
- Article
Tableau Methods for Formal Verification of Multi-Agent Distributed Systems.
- Published in:
- Journal of Logic & Computation, 1998, v. 8, n. 3, p. 373, doi. 10.1093/logcom/8.3.373
- By:
- Publication type:
- Article