Author:
Krautsevich Leanid,Lazouski Aliaksandr,Martinelli Fabio,Yautsiukhin Artsiom
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Vulnerability Selection for Remediation: An Empirical Analysis;The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology;2019-09-17
2. Too Long, did not Enforce;Proceedings of the 4th ACM Workshop on Cyber-Physical System Security;2018-05-22
3. Optimal Security Configuration for Cyber Insurance;ICT Systems Security and Privacy Protection;2018
4. Ontology-Based Self-Reconfiguring Guidance, Navigation, and Control for Planetary Rovers;Journal of Aerospace Information Systems;2016-08
5. Risk-Based Auto-delegation for Probabilistic Availability;Data Privacy Management and Autonomous Spontaneus Security;2012