Author of the publication

A cause and effect model of attacks on information systems : Some Analysis Based on That Model, and The Application of that Model for CyberWarfare in CID.

, , , , , , and . Computers & Security, 17 (3): 211-221 (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sleeping on the Job: Energy-Efficient and Robust Broadcast for Radio Networks., , , and . Algorithmica, 61 (3): 518-554 (2011)Editors Foreword to the Special Issue on Principles of Mobile Communications and Computing., and . Algorithmica, 49 (4): 259-263 (2007)Improved Bounds on Relaxations of a Parallel Machine Scheduling Problem., , , , and . J. Comb. Optim., 1 (4): 413-426 (1998)US Environmental Protection Agency Uses Operations Research to Reduce Contamination Risks in Drinking Water., , , , , , , , , and 5 other author(s). Interfaces, 39 (1): 57-68 (2009)Task Scheduling in Networks., , and . SIAM J. Discrete Math., 10 (4): 573-598 (1997)Strengthening integrality gaps for capacitated network design and covering problems., , , and . SODA, page 106-115. ACM/SIAM, (2000)Two-Level Main Memory Co-Design: Multi-threaded Algorithmic Primitives, Analysis, and Simulation., , , , , , , , , and . IPDPS, page 835-846. IEEE Computer Society, (2015)The Online Event-Detection Problem., , , , , , , and . CoRR, (2018)Improved Scheduling Algorithms for Minsum Criteria., , , , , and . ICALP, volume 1099 of Lecture Notes in Computer Science, page 646-657. Springer, (1996)Lessons Learned from 10k Experiments to Compare Virtual and Physical Testbeds., , , , and . CSET @ USENIX Security Symposium, USENIX Association, (2019)