Author of the publication

A Protection Profiles Approach to Risk Analysis for Small and Medium Enterprises.

, and . IICIS, volume 193 of IFIP, page 267-283. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Importance of Header Classification in HW/SW Network Intrusion Detection Systems., , and . Panhellenic Conference on Informatics, volume 3746 of Lecture Notes in Computer Science, page 661-671. Springer, (2005)Approaches to IT Security in Small and Medium Enterprises., , , and . AISM, page 73-82. School of Computer and Information Science, Edith Cowan University, Western Australia, (2004)A Protection Profiles Approach to Risk Analysis for Small and Medium Enterprises., and . IICIS, volume 193 of IFIP, page 267-283. Springer, (2004)A Memory-Efficient Reconfigurable Aho-Corasick FSM Implementation for Intrusion Detection Systems., , and . ICSAMOS, page 186-193. IEEE, (2007)