Author of the publication

Evaluation of Risk for Complex Systems Using Attack Surface.

, , and . ISSRE Workshops, page 275-280. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Krautsevich, Leanid
add a person with the name Krautsevich, Leanid
 

Other publications of authors with the same name

Evaluation of Risk for Complex Systems Using Attack Surface., , and . ISSRE Workshops, page 275-280. IEEE Computer Society, (2014)Towards Policy Engineering for Attribute-Based Access Control., , , and . INTRUST, volume 8292 of Lecture Notes in Computer Science, page 85-102. Springer, (2013)Evaluation of Adaptive Attacker Models., and . ESSoS Doctoral Symposium, volume 1298 of CEUR Workshop Proceedings, CEUR-WS.org, (2014)Using Attack Graphs to Analyze Social Engineering Threats., , and . IJSSE, 6 (2): 47-69 (2015)Influence of Attribute Freshness on Decision Making in Usage Control., , , and . STM, volume 6710 of Lecture Notes in Computer Science, page 35-50. Springer, (2010)Analysis of Social Engineering Threats with Attack Graphs., , and . DPM/SETOP/QASA, volume 8872 of Lecture Notes in Computer Science, page 216-232. Springer, (2014)Usage Control, Risk and Trust., , , , and . TrustBus, volume 6264 of Lecture Notes in Computer Science, page 1-12. Springer, (2010)Formal approach to security metrics.: what does "more secure" mean for you?, , and . ECSA Companion Volume, page 162-169. ACM, (2010)Cost-Effective Enforcement of Access and Usage Control Policies Under Uncertainties., , , and . IEEE Systems Journal, 7 (2): 223-235 (2013)Towards Attribute-Based Access Control Policy Engineering Using Risk., , , and . RISK@ICTSS, volume 8418 of Lecture Notes in Computer Science, page 80-90. Springer, (2013)