Author:
Altaf Amna,Faily Shamal,Dogan Huseyin,Mylonas Alexios,Thron Eylem
Publisher
Springer International Publishing
Reference41 articles.
1. Affairs, A.S.F.P.: Task Analysis, September 2013. /how-to-and-tools/methods/task-analysis.html
2. Al-Shargie, F., Tariq, U., Mir, H., Alawar, H., Babiloni, F., Al-Nashash, H.: Vigilance decrement and enhancement techniques: a review. Brain Sci. 9(8), 178 (2019). https://doi.org/10.3390/brainsci9080178
3. Lecture Notes in Computer Science;A Altaf,2020
4. Atzeni, A., Cameroni, C., Faily, S., Lyle, J., Flechais, I.: Here’s Johnny: a methodology for developing attacker personas. In: 2011 Sixth International Conference on Availability, Reliability and Security, Vienna, Austria, pp. 722–727. IEEE, August 2011. https://doi.org/10.1109/ARES.2011.115
5. Brostoff, S., Sasse, A.: Safe and sound: a safety-critical approach to security, p. 10 (2001)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献