Inproceedings,

Cloud-COVER: Using User Security Attribute Preferences and Propagation Analysis to Prioritise Threats to Systems.

, and .
EISIC, page 53-60. IEEE Computer Society, (2015)

Meta data

Tags

Users

  • @dblp

Comments and Reviews