Cited By
View all- Chen JKulkarni S(2013)MR4UMTheoretical Computer Science10.1016/j.tcs.2012.10.005496(17-33)Online publication date: 1-Jul-2013
- Aissa AAbercrombie RSheldon FMili A(2010)Quantifying security threats and their potential impactsInnovations in Systems and Software Engineering10.1007/s11334-010-0123-26:4(269-281)Online publication date: 1-Dec-2010
- Ben Aissa AAbercrombie RSheldon FMili A(2009)Quantifying security threats and their impactProceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies10.1145/1558607.1558637(1-6)Online publication date: 13-Apr-2009
- Show More Cited By