Author of the publication

C-SEC (Cyber SCADA evaluation capability): Securing critical infrastructures.

, , and . ISSRE Workshops, page 38. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IoDDoS - The Internet of Distributed Denial of Sevice Attacks - A Case Study of the Mirai Malware and IoT-Based Botnets., , , , and . IoTBDS, page 47-58. SciTePress, (2017)An Approach to Organizational Cybersecurity., , , , , , , , and . ES, volume 10131 of Lecture Notes in Computer Science, page 203-222. Springer, (2015)CCARCH: Architecting Common Criteria Security Requirements., , and . IAS, page 349-356. IEEE Computer Society, (2007)DITEC (DoD-Centric and Independent Technology Evaluation Capability): A Process for Testing Security.. ICST Workshops, page 24-25. IEEE Computer Society, (2014)Determining a Return on Investment for Cybersecurity Technologies in Networked Critical Infrastructures., , , , , , , and . Int. J. Organ. Collect. Intell., 11 (2): 91-112 (2021)ASSURE: automated support for secure and usable requirements engineering., , and . ISSTA, page 279-282. ACM, (2010)Secure and Usable Requirements Engineering.. ASE, page 703-706. IEEE Computer Society, (2009)C-SEC (Cyber SCADA evaluation capability): Securing critical infrastructures., , and . ISSRE Workshops, page 38. IEEE Computer Society, (2015)Increasing Trustworthiness through Security Testing Support., , and . SocialCom/PASSAT, page 920-925. IEEE Computer Society, (2010)Towards usable cyber security requirements., , , and . CSIIRW, page 64. ACM, (2009)