Home > Research > Browse

Results for User requirements

Publications & Outputs

  1. Threat Modeling the Cloud: An Ontology Based Approach

    Manzoor, S., Vateva-Gurova, T., Trapero, R. & Suri, N., 30/01/2019, IOSec 2018: Information and Operational Technology Security Systems . Fournaris, A., Lampropoulos, K. & Marin Tordera, E. (eds.). Cham: Springer-Verlag, p. 61-72 12 p. (Lecture Notes in Computer Science; vol. 11398).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Quality of information in wireless sensor networks: A survey

    Sachidananda, V., Khelil, A. & Suri, N., 2010.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review