Search results for: Bill Tsoumas
Lecture Notes in Computer Science > Critical Information Infrastructures Security > Session 8: Threats and Attacks Modeling > 299-310
Lecture Notes in Computer Science > Computer Network Security > Mathematical Models, Architectures and Protocols for Computer Network Security > 151-164
Lecture Notes in Computer Science > Trust, Privacy and Security in Digital Business > Security and Privacy Models for Pervasive Information Systems > 49-61