Author of the publication

Can the Common Vulnerability Scoring System be Trusted? A Bayesian Analysis.

, , , and . IEEE Trans. Dependable Secur. Comput., 15 (6): 1002-1015 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assessment of Social Impact Costs and Social Impact Magnitude from Breakdowns in Critical Infrastructures., , and . CRITIS, volume 7722 of Lecture Notes in Computer Science, page 240-251. Springer, (2012)Mapping Cyber Threat Intelligence to Probabilistic Attack Graphs., , , and . CSR, page 304-311. IEEE, (2021)A survey on CIO concerns-do enterprise architecture frameworks support them?, , , , and . Information Systems Frontiers, 8 (2): 81--90 (2006)A method for assessing the business value of information system scenarios with an estimated credibility of the result., , and . Int. J. Serv. Technol. Manag., 13 (1/2): 105-133 (2010)Effort Estimates for Vulnerability Discovery Projects., , and . HICSS, page 5564-5573. IEEE Computer Society, (2012)A framework for interoperability analysis on the semantic web using architecture models., , and . EDOCW, page 207-215. IEEE Computer Society, (2008)Mapping the Substation Configuration Language of IEC 61850 to ArchiMate., , , , and . EDOCW, page 60-68. IEEE Computer Society, (2010)Automatic Probabilistic Enterprise IT Architecture Modeling: A Dynamic Bayesian Networks Approach., , and . EDOC Workshops, page 1-8. IEEE Computer Society, (2016)Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural Models., , and . HICSS, page 1-10. IEEE Computer Society, (2009)A probabilistic relational model for security risk analysis., , and . Comput. Secur., 29 (6): 659-679 (2010)