Cited By
View all- Levine G(2014)Incorporating Service Degradations into a Security PlanProceedings of the 2014 IEEE International Conference on Software Science, Technology and Engineering10.1109/SWSTE.2014.10(1-9)Online publication date: 11-Jun-2014
- Levine G(2013)Computer security with service degradationsACM SIGSOFT Software Engineering Notes10.1145/2532780.253281038:6(1-7)Online publication date: 11-Nov-2013
- Levine G(2012)Priority inversion with fungible resourcesACM SIGAda Ada Letters10.1145/2148436.214843831:2(9-14)Online publication date: 22-Feb-2012
- Show More Cited By