Author of the publication

Quantitative Risk Assessment of Computer Virus Attacks on Computer Networks.

, , and . Computer Networks and ISDN Systems, 27 (10): 1447-1456 (1995)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance Analysis of a Split-Layer Multicast Mechanism with H.26L Video Coding Scheme., , and . ICETE (3), page 181-186. INSTICC Press, (2004)A New Word-Intersection Clustering Method for Information Filtering., , and . ICETE (1), page 241-244. INSTICC Press, (2004)Internet Security: Public-Key Infrastractures and Certification Systems., and . ICETE (2), page 93-106. INSTICC Press, (2004)Zero-Knowledge Blind Identification For Smart Cards Using Bilinear Pairings., , and . IACR Cryptology ePrint Archive, (2005)A new neural-network-based model for measuring the strength of a pseudorandom binary sequence., and . CoRR, (2019)From Learning Management Systems to a Social Learning Environment: A Comparative Review and the Implications., , , , and . Int. J. Smart Educ. Urban Soc., 10 (1): 1-18 (2019)Special issue on security and privacy in wireless systems., , and . Secur. Commun. Networks, 4 (7): 727-728 (2011)Improving e-Health Services and System Requirements by Modelling the Health Environment., , and . J. Softw., 9 (5): 1189-1201 (2014)A Proposed Secure TCP Connection-oriented Model for E-Commerce Systems., and . IMSA, page 68-73. IASTED/ACTA Press, (2002)A Cloud-Based Architecture for Interactive E-Training., , , and . Int. J. Knowl. Soc. Res., 8 (1): 67-78 (2017)