ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Security Modeling and Analysis of Cross-Protocol IoT Devices
2017 IEEE Trustcom/BigDataSE/ICESS
◽
10.1109/trustcom/bigdatase/icess.2017.350
◽
2017
◽
Cited By ~ 1
Author(s):
Mengmeng Ge
◽
Jin B. Hong
◽
Hani Alzaid
◽
Dong Seong Kim
Keyword(s):
Modeling And Analysis
◽
Security Modeling
◽
Iot Devices
Download Full-text
Related Documents
Cited By
References
Information Security Modeling and Analysis
Design and Verification of Microprocessor Systems for High-Assurance Applications
◽
10.1007/978-1-4419-1539-9_9
◽
2010
◽
pp. 249-299
◽
Cited By ~ 9
Author(s):
David A. Greve
Keyword(s):
Information Security
◽
Modeling And Analysis
◽
Security Modeling
Download Full-text
Security modeling and analysis of a self-cleansing intrusion tolerance technique
2015 11th International Conference on Information Assurance and Security (IAS)
◽
10.1109/isias.2015.7492754
◽
2015
◽
Cited By ~ 4
Author(s):
Iman El Mir
◽
Dong Seong Kim
◽
Abdelkrim Haqiq
Keyword(s):
Intrusion Tolerance
◽
Modeling And Analysis
◽
Security Modeling
Download Full-text
Security Modeling and Analysis of a SDN Based Web Service
Algorithms and Architectures for Parallel Processing - Lecture Notes in Computer Science
◽
10.1007/978-3-319-27161-3_68
◽
2015
◽
pp. 746-756
◽
Cited By ~ 1
Author(s):
Taehoon Eom
◽
Jin B. Hong
◽
Jong Sou Park
◽
Dong Seong Kim
Keyword(s):
Web Service
◽
Modeling And Analysis
◽
Security Modeling
Download Full-text
Security Modeling and Analysis on Intra Vehicular Network
2017 IEEE 86th Vehicular Technology Conference (VTC-Fall)
◽
10.1109/vtcfall.2017.8288289
◽
2017
◽
Cited By ~ 1
Author(s):
Jinli Zhong
◽
Suguo Du
◽
Lu Zhou
◽
Haojin Zhu
◽
Fan Cheng
◽
...
Keyword(s):
Vehicular Network
◽
Modeling And Analysis
◽
Security Modeling
Download Full-text
Security Modeling and Analysis
IEEE Security & Privacy
◽
10.1109/msp.2011.2
◽
2011
◽
Vol 9
(3)
◽
pp. 18-25
◽
Cited By ~ 32
Author(s):
Jason Bau
◽
John C. Mitchell
Keyword(s):
Modeling And Analysis
◽
Security Modeling
Download Full-text
Security Modeling and Analysis of Mobile Agent Systems
10.1142/p435
◽
2006
◽
Cited By ~ 5
Author(s):
Lu Ma
◽
Jeffrey J P Tsai
Keyword(s):
Mobile Agent
◽
Modeling And Analysis
◽
Agent Systems
◽
Mobile Agent Systems
◽
Security Modeling
Download Full-text
Security modeling and analysis of an intrusion tolerant cloud data center
2015 Third World Conference on Complex Systems (WCCS)
◽
10.1109/icocs.2015.7483264
◽
2015
◽
Cited By ~ 6
Author(s):
Iman El Mir
◽
Dong Seong Kim
◽
Abdelkrim Haqiq
Keyword(s):
Data Center
◽
Cloud Data Center
◽
Modeling And Analysis
◽
Cloud Data
◽
Security Modeling
◽
Intrusion Tolerant
Download Full-text
Formal procedural security modeling and analysis
2008 Third International Conference on Risks and Security of Internet and Systems
◽
10.1109/crisis.2008.4757486
◽
2008
◽
Cited By ~ 8
Author(s):
Komminist Weldemariam
◽
Adolfo Villafiorita
Keyword(s):
Modeling And Analysis
◽
Security Modeling
Download Full-text
Modeling and analysis of an intersection on AGT
Electrical Engineering in Japan
◽
10.1002/ecja.4400641004
◽
1981
◽
Vol 64
(10)
◽
pp. 18-27
Author(s):
Yoshio Hamamatsu
◽
Katsuhiro Nakada
◽
Ikuo Kaji
◽
Osamu Doi
Keyword(s):
Modeling And Analysis
Download Full-text
Judgments under uncertainty and time pressure: Modeling and analysis of operators' judgments of customers' creditworthiness
PsycEXTRA Dataset
◽
10.1037/e577392012-045
◽
2005
◽
Author(s):
Younho Seong
Keyword(s):
Time Pressure
◽
Modeling And Analysis
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close