Filter your results
- 12
- 12
- 12
- 4
- 1
- 4
- 6
- 1
- 12
- 1
- 1
- 1
- 1
- 4
- 3
- 3
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
12 results
|
|
sorted by
|
|
A Technique for Agile and Automatic Interaction Testing for Product Lines24th International Conference on Testing Software and Systems (ICTSS), Nov 2012, Aalborg, Denmark. pp.39-54, ⟨10.1007/978-3-642-34691-0_5⟩
Conference papers
hal-01482410v1
|
||
|
Tool-Supported Risk Modeling and Analysis of Evolving Critical InfrastructuresInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.562-577, ⟨10.1007/978-3-642-32498-7_43⟩
Conference papers
hal-01542434v1
|
||
|
Security SLAs – An Idea Whose Time Has Come?International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.123-130, ⟨10.1007/978-3-642-32498-7_10⟩
Conference papers
hal-01542465v1
|
||
|
GPRS Security for Smart Meters1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.195-207
Conference papers
hal-01506796v1
|
||
|
Hunting for Aardvarks: Can Software Security Be Measured?International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.85-92, ⟨10.1007/978-3-642-32498-7_7⟩
Conference papers
hal-01542432v1
|
||
|
Using Critical Incidents in Workshops to Inform eHealth Design16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.364-373, ⟨10.1007/978-3-319-67744-6_24⟩
Conference papers
hal-01676170v1
|
||
|
Towards Improved Understanding and Holistic Management of the Cyber Security Challenges in Power Transmission Systems1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.240-255
Conference papers
hal-01506786v1
|
||
|
An Approach to Select Cost-Effective Risk Countermeasures27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.266-273, ⟨10.1007/978-3-642-39256-6_18⟩
Conference papers
hal-01490710v1
|
||
|
Towards a Similarity Metric for Comparing Machine-Readable Privacy PoliciesInternational Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.89-103, ⟨10.1007/978-3-642-27585-2_8⟩
Conference papers
hal-01481509v1
|
||
|
Seeking Risks: Towards a Quantitative Risk Perception Measure1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.256-271
Conference papers
hal-01506790v1
|
||
|
A Risk-Based Evaluation of Group Access Control Approaches in a Healthcare Setting1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.26-37, ⟨10.1007/978-3-642-23300-5_3⟩
Conference papers
hal-01590398v1
|
||
|
Usage Control in Inter-organisational Collaborative Environments – A Case Study from an Industry PerspectiveInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.317-331, ⟨10.1007/978-3-642-32498-7_24⟩
Conference papers
hal-01542431v1
|