Cited By
View all- Anikin IEmaletdinova LMakarevich OPoet RElçi AGaur MOrgun MBabenko LFerdous SHo ALaxmi VPieprzyk J(2015)Information security risk management in computer networks based on fuzzy logic and cost/benefit ratio estimationProceedings of the 8th International Conference on Security of Information and Networks10.1145/2799979.2800022(8-11)Online publication date: 8-Sep-2015
- Horcher ATejay G(2009)Building a better passwordProceedings of the 2009 IEEE international conference on Intelligence and security informatics10.5555/1706428.1706448(113-118)Online publication date: 8-Jun-2009