Citations
The paper
has been cited by the following works.
- S. Fenz, A. Ekelhart, and
E. Weippl.
Fortification of IT security by automatic security advisory processing.
In AINA 2008: International Conference on Advanced Information Networking
and Applications, pages 575–582, 2008.
(doi:10.1109/AINA.2008.69)
- R. Gandhi and S.-W. Lee.
Ontology guided risk analysis: From informal specifications to formal metrics.
Studies in Computational Intelligence, 251:227–249, 2009.
(doi:10.1007/978-3-642-04141-9_11)
- D. Zissis and
D. Lekkas.
Trust coercion in the name of usable public key infrastructure.
Security and Communication Networks, 7(11):1734–1745, 2013.
(doi:10.1002/sec.870)
Home
Unless otherwise expressly stated, all original material on this page created by Diomidis Spinellis is licensed under a Creative Commons Attribution-Share Alike 3.0 Greece License.