Year | DOI | Venue |
---|---|---|
2011 | 10.1108/09685221111173058 | Inf. Manag. Comput. Security |
Keywords | Field | DocType |
computer and information science,management,computer network,auditing,computer networks,information security,computer security,information technology | USable,Data mining,Authentication,Information technology,Computer security,Computer science,Quantitative assessment,False positives and false negatives,Vulnerability scanning,Information and Computer Science,Vulnerability | Journal |
Volume | Issue | Citations |
19 | 4 | 15 |
PageRank | References | Authors |
0.87 | 20 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Hannes Holm | 1 | 191 | 14.59 |
Teodor Sommestad | 2 | 292 | 23.72 |
Jonas Almroth | 3 | 15 | 1.21 |
Mats Persson | 4 | 43 | 6.15 |