ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
3
views
0
references
Top references
cited by
9
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,618
similar
All similar
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Dependability and security models
proceedings-article
Author(s):
Kishor S. Trivedi
,
Dong Seong Kim
,
Arpan Roy
,
Deep Medhi
Publication date
(Print):
October 2009
Publisher:
IEEE
Conference name:
2009 7th International Workshop on Design of Reliable Communication Networks (DRCN)
Conference date:
November 25, 2009 - November 28, 2009
Read this article at
ScienceOpen
Publisher
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Exponential Random Graph Models
Author and article information
Conference
Publisher:
IEEE
Publication date:
October 2009
Publication date (Print):
October 2009
Pages
: 11-20
Article
DOI:
10.1109/DRCN.2009.5340029
SO-VID:
05be34e2-0fd4-4a09-930f-0320f7a833f5
Copyright ©
© 2009
Conference name:
2009 7th International Workshop on Design of Reliable Communication Networks (DRCN)
Conference location:
Washington, DC, USA
Conference date:
November 25, 2009 - November 28, 2009
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
2,618
ISBP: Understanding the Security Rule of Users' Information-Sharing Behaviors in Partnership
Authors:
Hongchen Wu
,
Xinjun Wang
Private Security & Local Politics in Somalia
Authors:
Stig Jarle Hansen
Digitisation at Three UK Herbaria Contributes Towards Food Security and Sustainable Timber Use
Authors:
Laura Green
,
Marie-Hélène Weech
,
Robyn E. Drinkwater
…
See all similar
Cited by
9
Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees
Authors:
Dong Seong Kim
,
Arpan Roy
,
Kishor S Trivedi
Evaluation of network resilience, survivability, and disruption tolerance: analysis, topology generation, simulation, and experimentation
Authors:
James P. G. Sterbenz
,
Egemen Çetinkaya
,
Mahmood Hameed
…
Attacker Profiling in Quantitative Security Assessment Based on Attack Trees
Authors:
Aleksandr Lenin
,
Jan Willemson
,
Dyan Permata Sari
See all cited by