Author of the publication

Defense against Insider Threat: a Framework for Gathering Goal-based Requirements.

, and . EMMSAD, volume 365 of CEUR Workshop Proceedings, page 183-192. CEUR-WS.org, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Locky Ransomware, Al Capone and Brexit., and . ICDF2C, volume 216 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 33-45. Springer, (2017)Multi-step attack modelling and simulation (MsAMS) framework based on mobile ambients., , and . SAC, page 66-73. ACM, (2009)A Systematic Literature Review on Cyber Security Education for Children., , and . IEEE Trans. Educ., 66 (3): 274-286 (June 2023)WVD: A New Synthetic Dataset for Video-Based Violence Detection., , , and . SGAI Conf., volume 11927 of Lecture Notes in Computer Science, page 158-164. Springer, (2019)Risk and argument: A risk-based argumentation method for practical security., , , , and . RE, page 239-248. IEEE Computer Society, (2011)Role-Based Access Control in Retrospect., and . Computer, 45 (6): 81-88 (2012)Engineering Security Agreements Against External Insider Threat., , , and . IRMJ, 26 (4): 66-91 (2013)Factors Influencing Digital Forensic Investigations: Empirical Evaluation of 12 Years of Dubai Police Cases., , , and . J. Digit. Forensics Secur. Law, 10 (4): 7-16 (2015)Using Real Option Thinking to Improve Decision Making in Security Investment., , and . OTM Conferences (1), volume 6426 of Lecture Notes in Computer Science, page 619-638. Springer, (2010)OpenArgue: Supporting argumentation to evolve secure software systems., , , , and . RE, page 351-352. IEEE Computer Society, (2011)