[1]
|
The Cybersecurity Risk Estimation Engine: A Tool for Possibility Based Risk Analysis
Computers & Security,
2022
DOI:10.1016/j.cose.2022.102752
|
|
|
[2]
|
CyberEvo
Proceedings of the Genetic and Evolutionary Computation Conference Companion,
2022
DOI:10.1145/3520304.3533999
|
|
|
[3]
|
CyberEvo
Proceedings of the Genetic and Evolutionary Computation Conference Companion,
2022
DOI:10.1145/3520304.3533999
|
|
|
[4]
|
CyberEvo
Proceedings of the Genetic and Evolutionary Computation Conference Companion,
2022
DOI:10.1145/3520304.3533999
|
|
|
[5]
|
CyberEvo
Proceedings of the Genetic and Evolutionary Computation Conference Companion,
2022
DOI:10.1145/3520304.3533999
|
|
|
[6]
|
Handbook of Research on Cyber Crime and Information Privacy
Advances in Information Security, Privacy, and Ethics,
2020
DOI:10.4018/978-1-7998-5728-0.ch025
|
|
|
[7]
|
Automating the Assessment of Networking and Security in Higher Education
Annals of Emerging Technologies in Computing,
2020
DOI:10.33166/AETiC.2020.02.001
|
|
|
[8]
|
Impact and Key Challenges of Insider Threats on Organizations and Critical Businesses
Electronics,
2020
DOI:10.3390/electronics9091460
|
|
|
[9]
|
Architecting Cyber Defense: A Survey of the Leading Cyber Reference Architectures and Frameworks
2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud),
2017
DOI:10.1109/CSCloud.2017.37
|
|
|