Author of the publication

Cyberspace and Organizational Structure: An Analysis of the Critical Infrastructure Environment.

, , , , and . Critical Infrastructure Protection, volume 485 of IFIP Advances in Information and Communication Technology, page 3-25. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Java based component identification tool for measuring the strength of circuit protections., , , and . CSIIRW, page 26. ACM, (2010)An Undergraduate Business Information Security Course and Laboratory., and . J. Inf. Syst. Educ., 13 (3): 189-196 (2002)A survey of state-of-the-art in anonymity metrics., , , , and . NDA, page 31-40. ACM, (2008)A Systems Security Approach for Requirements Analysis of Complex Cyber-Physical Systems., , , and . Cyber Security, page 1-8. IEEE, (2018)Narratives as a Fundamental Component of Consciousness., , , , and . CMN, volume 41 of OASIcs, page 246-250. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2014)Modeling the probability of defect excitation for a commercial IC with implications for stuck-at fault-based ATPG strategies., , , , and . ITC, page 1031-1037. IEEE Computer Society, (1999)Mitigating Security Risks for End User Computing Application (EUCA) Data., , and . SocialCom/PASSAT, page 1171-1176. IEEE Computer Society, (2010)Adding value to log event correlation using distributed techniques., , and . CSIIRW, page 32. ACM, (2010)Towards a Taxonomy of Wired and Wireless Anonymous Networks., , , , and . ICC, page 1-8. IEEE, (2009)Towards Predictive Mission Risk Analysis to Operationalize Mission Assured Networking., and . Security and Management, page 542-547. CSREA Press, (2010)