Cited By
View all- Ge MHong JGuttmann WKim D(2017)A framework for automating security analysis of the internet of thingsJournal of Network and Computer Applications10.1016/j.jnca.2017.01.03383:C(12-27)Online publication date: 1-Apr-2017
- (2017)A survey on the usability and practical applications of Graphical Security ModelsComputer Science Review10.1016/j.cosrev.2017.09.00126:C(1-16)Online publication date: 1-Nov-2017
- Alsaleh MAl-Shaer EHusari G(2017)ROI-Driven Cyber Risk Mitigation Using Host Compliance and Network ConfigurationJournal of Network and Systems Management10.1007/s10922-017-9428-x25:4(759-783)Online publication date: 1-Oct-2017
- Show More Cited By