Flow-Graph and Markovian Methods for Cyber Security Analysis
| Year of publication: |
2016
|
|---|---|
| Authors: | Jenab, Kouroush ; Khoury, Sam ; LaFevor, Kim |
| Published in: |
International Journal of Enterprise Information Systems (IJEIS). - IGI Global, ISSN 1548-1123, ZDB-ID 2400001-2. - Vol. 12.2016, 1 (01.01.), p. 59-84
|
| Publisher: |
IGI Global |
| Subject: | Block Diagram | Flow-Graph | Incident Detection | Threat Detection |
-
Flow-graph and markovian methods for cyber security analysis
Jenab, Kouroush, (2016)
-
Managing Cybersecurity Threats and Increasing Organizational Resilience
Trim, Peter R.J., (2023)
-
Simulation assessment of incident detection by cellular phone call-in programs
Mussa, Renatus, (1999)
- More ...
-
Flow-graph and markovian methods for cyber security analysis
Jenab, Kouroush, (2016)
-
Study of the relationship between employee engagement and organisational effectiveness
Teimouri, Hadi, (2016)
-
Teimouri, Hadi, (2018)
- More ...