Author of the publication

Organizational Risk Assessment Based on Attacks Repetition.

, , , , and . ARES, page 286-290. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Threshold Cryptography and Authentication in Ad Hoc Networks Survey and Challenges., , and . ICSNC, page 5. IEEE Computer Society, (2007)Cyber Threats and Policies for Industrial Control Systems., and . SmartNets, page 1-6. IEEE, (2019)Certification and Revocation Schemes in Ad Hoc Networks Survey and Challenges., , and . ICSNC, page 17. IEEE Computer Society, (2007)Lightweight Authentication Protocol Deployment over FlexRay., , , and . INFOS, page 233-239. ACM, (2016)Organizational Risk Assessment Based on Attacks Repetition., , , , and . ARES, page 286-290. IEEE Computer Society, (2012)Security in Ad Hoc Networks: From Vulnerability to Risk Management., , and . SECURWARE, page 203-209. IEEE Computer Society, (2009)A Survey on Trust and Reputation Schemes in Ad Hoc Networks., , , and . ARES, page 881-886. IEEE Computer Society, (2008)Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme., , , and . ARES, page 636-641. IEEE Computer Society, (2008)An innovative approach for the wormhole attack detection and prevention in wireless ad hoc networks., , and . ICNSC, page 366-371. IEEE, (2010)Using Attack Graphs in Ad Hoc Networks - For Intrusion Prediction Correlation and Detection., , and . SECRYPT, page 63-68. INSTICC Press, (2006)