Author:
Hausawi Yasser M.,Allen William H.
Publisher
Springer International Publishing
Reference27 articles.
1. Adams, A., Sasse, M.A.: Users are not the enemy. Commun. ACM 42(12), 40–46 (1999)
2. Communications in Computer and Information Science;A Alkussayer,2009
3. Alkussayer, A., Allen, W.H.: A scenario-based framework for the security evaluation of software architecture. In: 3rd IEEE International Conference on ICCSIT, vol. 5, pp. 687–695. IEEE (2010)
4. Atallah, M.J., McDonough, C.J., Raskin, V., Nirenburg, S.: Natural language processing for information assurance and security: an overview and implementations. In: Proceedings of the 2000 Workshop on New Security Paradigms, pp. 51–65. ACM (2001)
5. Benson, G., Re, S.R.: System and method for device registration and authentication, 8 June 2012, uS Patent App. 13/492,126
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献