From post

"Check, Check, Check, We Got Those" - Catalogue Use in Information Security Risk Management.

, , , и . HAISA, том 674 из IFIP Advances in Information and Communication Technology, стр. 181-191. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

CloudSurfer - A Cloud Broker Application for Security Concerns., , , , , , , и . CLOSER, стр. 199-206. SciTePress, (2013)An experimental evaluation of bow-tie analysis for security., , , , и . Inf. Comput. Secur., (2019)Information Security Incident Management: Identified Practice in Large Organizations., , , и . IMF, стр. 27-46. IEEE Computer Society, (2014)Visualizing Cyber Security Risks with Bow-Tie Diagrams., , , , и . GraMSec@CSF, том 10744 из Lecture Notes in Computer Science, стр. 38-56. Springer, (2017)Security-by-design challenges for medical device manufacturers., и . EICC, стр. 155-160. ACM, (2024)Security SLAs - An Idea Whose Time Has Come?, , и . CD-ARES, том 7465 из Lecture Notes in Computer Science, стр. 123-130. Springer, (2012)On the Certificate Revocation Problem in the Maritime Sector., , , и . NordSec, том 12556 из Lecture Notes in Computer Science, стр. 142-157. Springer, (2020)Learning Privacy Preferences., , и . ARES, стр. 621-626. IEEE Computer Society, (2011)Accountability Requirements for the Cloud., , , , , и . CloudCom, стр. 375-382. IEEE Computer Society, (2017)Thunder in the Clouds: Security challenges and solutions for federated Clouds., , , и . CloudCom, стр. 113-120. IEEE Computer Society, (2012)