Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing resilience: implementing resilience building policies against major industrial accidents., , , and . Int. J. Crit. Infrastructures, 9 (1/2): 130-147 (2013)Security Strategy Analysis for Critical Information Infrastructures., , and . CRITIS, volume 5508 of Lecture Notes in Computer Science, page 247-257. Springer, (2008)Three units of analysis for Crisis Management and Critical Infrastructure Protection., , , and . ISCRAM, LNEC, Lisbon, Portugal, (2011)Learning from Your Elders: A Shortcut to Information Security Management Success., , and . SAFECOMP, volume 4680 of Lecture Notes in Computer Science, page 224-237. Springer, (2007)Modeling and Simulating Information Security Management., , , , , and . CRITIS, volume 5141 of Lecture Notes in Computer Science, page 327-336. Springer, (2007)Blind information security strategy., , and . Int. J. Crit. Infrastructure Prot., 2 (3): 95-109 (2009)Critical infrastructure dependencies: A holistic, dynamic and quantitative approach., , and . Int. J. Crit. Infrastructure Prot., (2015)The Dynamics of Cyber Resilience Management., , , , and . ISCRAM, ISCRAM Association, (2019)An Approach to the Modeling of Cyber Resilience Management., , , and . GIoTS, page 1-6. IEEE, (2018)A Framework for Conceptualizing Social Engineering Attacks., , and . CRITIS, volume 4347 of Lecture Notes in Computer Science, page 79-90. Springer, (2006)