Cited By
View all- Baskerville RRowe FWolff F(2018)Integration of Information Systems and Cybersecurity CountermeasuresACM SIGMIS Database: the DATABASE for Advances in Information Systems10.1145/3184444.318444849:1(33-52)Online publication date: 1-Feb-2018
- Kurra KPanda BLi WHu Y(2015)An Agent Based Approach to Perform Damage Assessment and Recovery Efficiently after a Cyber Attack to Ensure E-government Database SecurityProceedings of the 2015 48th Hawaii International Conference on System Sciences10.1109/HICSS.2015.272(2272-2279)Online publication date: 5-Jan-2015
- Baskerville RSpagnoletti PKim J(2014)Incident-centered information securityInformation and Management10.1016/j.im.2013.11.00451:1(138-151)Online publication date: 1-Jan-2014
- Show More Cited By