Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs
Chen Cao
,
Lun-Pin Yuan
,
Anoop Singhal
,
Peng Liu
,
Xiaoyan Sun
,
et al.
32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec) , Jul 2018, Bergamo, Italy. pp.330-348,
⟨10.1007/978-3-319-95729-6_21⟩
Conference papers
hal-01954421v1
Actions
Share
Gmail
Facebook
X
LinkedIn
More
The Determinants of RFID Use and Its Benefits in Hospitals: An Empirical Study Examining Beyond Adoption
Mohammad Alamgir Hossain
,
Azizah Ahmad
Conference papers
hal-02274175v1
Actions
Share
Gmail
Facebook
X
LinkedIn
More
Assimilation of Business Intelligence Systems: The Mediating Role of Organizational Knowledge Culture
Azizah Ahmad
,
Mohammad Alamgir Hossain
Conference papers
hal-02274198v1
Actions
Share
Gmail
Facebook
X
LinkedIn
More
Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds
Nawaf Alhebaishi
,
Lingyu Wang
,
Sushil Jajodia
,
Anoop Singhal
32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec) , Jul 2018, Bergamo, Italy. pp.3-20,
⟨10.1007/978-3-319-95729-6_1⟩
Conference papers
hal-01954402v1
Actions
Share
Gmail
Facebook
X
LinkedIn
More