Evolving a Secure Internet. | 0 | 0.34 | 2013 |
Background to the Development of a Curriculum for the History of "Cyber" and "Communications" Security. | 0 | 0.34 | 2013 |
A Business Continuity Management Simulator. | 0 | 0.34 | 2010 |
Feasibility Of Automated Information Security Compliance Auditing | 0 | 0.34 | 2008 |
Security Risk Analysis for Complex Systems | 0 | 0.34 | 2006 |
Developing Threat Networks for Risk Analysis of Information Systems | 1 | 0.40 | 2005 |
Security Documentation | 0 | 0.34 | 2001 |
Information security management and modelling | 8 | 0.85 | 1999 |
Code of practice: a standard for information security management | 3 | 0.68 | 1997 |
Complementarity Attacks and Control Vectors | 1 | 0.37 | 1993 |
The Risk Data Repository: A Novel Approach to Security Risk Modelling | 4 | 1.55 | 1993 |
A Methodology for Describing Information and Physical Security Architectures | 8 | 1.44 | 1992 |