Author of the publication

An Empirical Evaluation of the Effectiveness of Attack Graphs and Fault Trees in Cyber-Attack Perception.

, , and . IEEE Trans. Inf. Forensics Secur., 13 (5): 1110-1122 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure search scheme for encrypted data in the VANET cloud with random query trapdoor., , and . Inf. Secur. J. A Glob. Perspect., 32 (5): 383-400 (September 2023)Towards a standardised attack graph visual syntax.. University of Warwick, Coventry, UK, (2019)British Library, EThOS.CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection., , and . TrustCom, page 931-936. IEEE Computer Society, (2012)Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic., , , , , , and . Comput. Secur., (2021)Where has this Hard Disk Been?: Extracting Geospatial Intelligence from Digital Storage Systems., and . Cyberpatterns, Springer, (2014)A review of attack graph and attack tree visual syntax in cyber security., , and . Comput. Sci. Rev., (2020)An empirical evaluation of the effectiveness of attack graphs and MITRE ATT&CK matrices in aiding cyber attack perception amongst decision-makers., and . Comput. Secur., (2023)Verify and trust: A multidimensional survey of zero-trust security in the age of IoT., , , , and . Internet Things, (2024)Evaluating practitioner cyber-security attack graph configuration preferences., , and . Comput. Secur., (2018)Global Network Security: A Vulnerability Assessment of Seven Popular Outsourcing Countries., , and . GreenCom, page 102-108. IEEE Computer Society, (2012)