Author of the publication

Identifying the Missing Aspects of the ANSI/ISA Best Practices for Security Policy.

, , , , and . CPSS@ASIACSS, page 37-48. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ForestFirewalls: Getting Firewall Configuration Right in Critical Networks (Technical Report)., , , , and . CoRR, (2019)The Mathematical Foundations for Mapping Policies to Network Devices., , , and . SECRYPT, page 197-206. SciTePress, (2016)Koli Calling 2019 call for submissions., and . ACM SIGCSE Bull., 51 (3): 3-4 (2019)Reverse engineering the Raspberry Pi Camera V2: A study of pixel non-uniformity using a scanning electron microscope., , and . Digit. Investig., (2020)RF-Care: Device-Free Posture Recognition for Elderly People Using A Passive RFID Tag Array., , , , , , and . EAI Endorsed Trans. Ambient Syst., 2 (6): e2 (2015)The Australian Digital Technologies Curriculum: Challenge and Opportunity., , and . ACE, volume 148 of CRPIT, page 3-12. Australian Computer Society, (2014)Koli Calling 2020 call for participation., and . ACM SIGCSE Bull., 52 (3): 4-5 (2020)Malachite: Firewall policy comparison., , , and . ISCC, page 310-317. IEEE Computer Society, (2016)Verifiable Policy-defined Networking for Security Management., , , , , , and . SECRYPT, page 344-351. SciTePress, (2016)Teaching Computational Thinking in K-6: The CSER Digital Technologies MOOC., , and . ACE, volume 160 of CRPIT, page 63-72. Australian Computer Society, (2015)