Author:
Altaf Amna,Faily Shamal,Dogan Huseyin,Mylonas Alexios,Thron Eylem
Publisher
Springer International Publishing
Reference17 articles.
1. Randstad Rail - Generic Risk Assessment Log.
https://www.randstad.co.uk
2. RISI - The Repository of Industrial Security Incidents (2008).
https://www.risidata.com
3. Alper, S.J., Karsh, B.T.: A systematic review of safety violations in industry. Accid. Anal. Prev. 41(4), 739–754 (2009)
4. Atzeni, A., Cameroni, C., Faily, S., Lyle, J., Flechais, I.: Here’s Johnny: a methodology for developing attacker personas. In: 2011 Sixth International Conference on Availability, Reliability and Security, pp. 722–727. IEEE, Vienna (August 2011)
5. Avizienis, A., Laprie, J.C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. Dependable Secure Comput. 1(1), 11–33 (2004)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献