Citations
The paper
has been cited by the following works.
- Bouchalb Bahli
and Younes Benslimane.
An exploration of wireless computing risks: Development of a risk taxonomy.
Information Management and Computer Security, 12(3):245–254,
2004.
(doi:10.1108/09685220410542606)
- J. Du, J. Jiao, and X. Li.
A security blueprint for e-business applications based on the three-tier
architecture.
In 2004 IEEE Conference on Cybernetics and Intelligent Systems,
pages 878–883, 2004.
- Martin Naedele and
Thomas E. Koch.
Trust and tamper-proof software delivery.
In SESS '06: Proceedings of the 2006 International Workshop on Software
Engineering for Secure Systems, pages 51–58, New York, NY, USA, 2006.
ACM Press.
(doi:10.1145/1137627.1137636)
- V. Clincy, J. Garrido,
and Y. Nzibo.
A firewall simulation study.
In 2007 International Conference on Communications in Computing, CIC
2007, pages 16–20, 2007.
- M. Garuba, C. Liu, and
N. Washington.
A comparative analysis of anti-malware software, patch management, and
host-based firewalls in preventing malware infections on client computers.
In Proceedings — International Conference on Information Technology:
New Generations, ITNG 2008, pages 628–632, 2008.
(doi:10.1109/ITNG.2008.233)
- E.-H. Jung and Y.-J. Park.
TinyONet: A cache-based sensor network bridge enabling sensing data
reusability and customized wireless sensor network services.
Sensors, 8(12):7930–7950, 2008.
(doi:10.3390/s8127930)
- J. Ruan, Y. Shi, and
T. Samatsu.
A similarity-based M(1,2,3) approach for rating the security of network
systems.
In 2014 Joint 7th International Conference on Soft Computing and
Intelligent Systems, SCIS 2014 and 15th International Symposium on Advanced
Intelligent Systems, ISIS 2014, pages 1078–1084. Institute of
Electrical and Electronics Engineers Inc., 2014.
(doi:10.1109/SCIS-ISIS.2014.7044737)
- J. Ruan, T. Samatsu, and
Y. Shi.
A similarity-based M(1,2,3) approach and its application in rating the
security of network systems.
International Journal of Innovative Computing, Information and
Control, 11(6):2177–2191, 2015.
Home
Unless otherwise expressly stated, all original material on this page created by Diomidis Spinellis is licensed under a Creative Commons Attribution-Share Alike 3.0 Greece License.