Filter your results
- 3
- 1
- 3
- 1
- 4
- 2
- 2
- 4
- 2
- 1
- 3
- 3
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
A Risk Assessment Method for Smartphones27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.443-456, ⟨10.1007/978-3-642-30436-1_36⟩
Conference papers
hal-01518232v1
|
||
|
Cascading Effects of Common-Cause Failures in Critical Infrastructures7th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2013, Washington, DC, United States. pp.171-182, ⟨10.1007/978-3-642-45330-4_12⟩
Conference papers
hal-01456884v1
|
||
|
Information Security and Privacy ResearchSpringer, AICT-376, 2012, IFIP Advances in Information and Communication Technology, 978-3-642-30436-1. ⟨10.1007/978-3-642-30436-1⟩
Books
hal-01518244v1
|
||
|
In Cloud We Trust: Risk-Assessment-as-a-Service7th Trust Management (TM), Jun 2013, Malaga, Spain. pp.100-110, ⟨10.1007/978-3-642-38323-6_7⟩
Conference papers
hal-01468186v1
|