Author of the publication

Can We Ever Build Survivable Systems from COTS Components?

, , and . CAiSE, volume 2348 of Lecture Notes in Computer Science, page 216-229. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unintentional Insider Threat: Contributing Factors, Observables, and Mitigation Strategies., , , , , , and . HICSS, page 2025-2034. IEEE Computer Society, (2014)A Preliminary Model of Insider Theft of Intellectual Property., , , , , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2 (1): 28-49 (2011)TRIAD: a framework for survivability architecting., and . SSRS@CCS, page 105-109. ACM, (2003)Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits., , , , , and . IEEE Symposium on Security and Privacy Workshops, page 236-250. IEEE Computer Society, (2014)A pattern for increased monitoring for intellectual property theft by departing insiders., , and . PLoP, page 19:1-19:10. ACM, (2011)Can We Ever Build Survivable Systems from COTS Components?, , and . CAiSE, volume 2348 of Lecture Notes in Computer Science, page 216-229. Springer, (2002)The Specification and Verified Decomposition of System Requirements Using CSP.. IEEE Trans. Software Eng., 16 (9): 932-948 (1990)A Security Policy and Formal Top Level Specification for a Multi-Level Secure Local Area Network., and . S&P, page 34-39. IEEE Computer Society, (1986)Introduction to the special issue on insider threat modeling and simulation., , and . Comput. Math. Organ. Theory, 22 (3): 261-272 (2016)The "Big Picture" of Insider IT Sabotage Across U.S. Critical Infrastructures., , and . Insider Attack and Cyber Security, volume 39 of Advances in Information Security, Springer, (2008)