Author of the publication

A multi-layer Criticality Assessment methodology based on interdependencies.

, , and . Comput. Secur., 29 (6): 643-658 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Hierarchical Multi Blockchain for Fine Grained Access to Medical Data., , , and . IEEE Access, (2020)Broadcast anonymous routing (BAR): scalable real-time anonymous communication., , and . Int. J. Inf. Sec., 16 (3): 313-326 (2017)Process-Aware Attacks on Medication Control of Type-I Diabetics Using Infusion Pumps., , , and . IEEE Syst. J., 17 (2): 1831-1842 (June 2023)Communication Resilience for Smart Grids Based on Dependence Graphs and Eigenspectral Analysis., , and . IEEE Syst. J., 16 (4): 6558-6568 (2022)SecMR - a secure multipath routing protocol for ad hoc networks., , and . Ad Hoc Networks, 5 (1): 87-99 (2007)Data Retention and Privacy in Electronic Communications.. IEEE Secur. Priv., 6 (5): 46-52 (2008)Toward early warning against Internet worms based on critical-sized networks., , , and . Secur. Commun. Networks, 6 (1): 78-88 (2013)Assessing Vulnerabilities and IoT-Enabled Attacks on Smart Lighting Systems., , and . CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS, volume 13106 of Lecture Notes in Computer Science, page 199-217. Springer, (2021)An Experimental Analysis of Current DDoS attacks Based on a Provider Edge Router Honeynet., , and . IISA, page 1-5. IEEE, (2019)Performance Analysis of a Hybrid Key Establishment Protocol for Wireless Sensor Networks., , and . ISM, page 719-724. IEEE Computer Society, (2005)