Found: 12
Select item for more details and to access through your institution.
Generating ICS vulnerability playbooks with open standards.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 1215, doi. 10.1007/s10207-023-00760-5
- By:
- Publication type:
- Article
Digital-Twin-Based Security Analytics for the Internet of Things.
- Published in:
- Information (2078-2489), 2023, v. 14, n. 2, p. 95, doi. 10.3390/info14020095
- By:
- Publication type:
- Article
DEALER: decentralized incentives for threat intelligence reporting and exchange.
- Published in:
- International Journal of Information Security, 2021, v. 20, n. 5, p. 741, doi. 10.1007/s10207-020-00528-1
- By:
- Publication type:
- Article
Measuring and visualizing cyber threat intelligence quality.
- Published in:
- International Journal of Information Security, 2021, v. 20, n. 1, p. 21, doi. 10.1007/s10207-020-00490-y
- By:
- Publication type:
- Article
Situation awareness for recommender systems.
- Published in:
- Electronic Commerce Research, 2020, v. 20, n. 4, p. 783, doi. 10.1007/s10660-018-9321-z
- By:
- Publication type:
- Article
Towards a capability maturity model for digital forensic readiness.
- Published in:
- Wireless Networks (10220038), 2020, v. 26, n. 7, p. 4895, doi. 10.1007/s11276-018-01920-5
- By:
- Publication type:
- Article
Human-as-a-security-sensor for harvesting threat intelligence.
- Published in:
- Cybersecurity (2523-3246), 2019, v. 2, n. 1, p. N.PAG, doi. 10.1186/s42400-019-0040-0
- By:
- Publication type:
- Article
Correction to: Human-as-a-security-sensor for harvesting threat intelligence.
- Published in:
- 2019
- By:
- Publication type:
- Correction Notice
Graph-based visual analytics for cyber threat intelligence.
- Published in:
- Cybersecurity (2523-3246), 2018, v. 1, n. 1, p. N.PAG, doi. 10.1186/s42400-018-0017-4
- By:
- Publication type:
- Article
Adaptive identity and access management-contextual data based policies.
- Published in:
- EURASIP Journal on Information Security, 2016, v. 2016, n. 1, p. 1, doi. 10.1186/s13635-016-0043-2
- By:
- Publication type:
- Article
Minimizing insider misuse through secure Identity Management.
- Published in:
- Security & Communication Networks, 2012, v. 5, n. 8, p. 847, doi. 10.1002/sec.314
- By:
- Publication type:
- Article
Trust, privacy and security in digital business.
- Published in:
- Computer Systems Science & Engineering, 2005, v. 20, n. 6, p. 391
- By:
- Publication type:
- Article