ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
15
views
0
references
Top references
cited by
3
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,931
similar
All similar
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Here's Johnny: A Methodology for Developing Attacker Personas
proceedings-article
Author(s):
Andrea Atzeni
,
Cesare Cameroni
,
Shamal Faily
,
John Lyle
,
Ivan Flechais
Publication date
(Print):
August 2011
Publisher:
IEEE
Conference name:
2011 Sixth International Conference on Availability, Reliability and Security (ARES)
Conference date:
September 22, 2011 - September 26, 2011
Read this article at
ScienceOpen
Publisher
Further versions
oa repository (via OAI-PMH doi match)
oa repository (via OAI-PMH doi match)
oa repository (via OAI-PMH title and first author match)
Powered by
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Developing Data Infrastructures
Author and article information
Conference
Publisher:
IEEE
Publication date:
August 2011
Publication date (Print):
August 2011
Pages
: 722-727
Article
DOI:
10.1109/ARES.2011.115
SO-VID:
9724f47c-4da9-4627-9e30-80835bb44266
Copyright ©
© 2011
Conference name:
2011 Sixth International Conference on Availability, Reliability and Security (ARES)
Conference location:
Vienna, Austria
Conference date:
September 22, 2011 - September 26, 2011
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
3,931
Johnny Depp Starts Here
Authors:
M Pomérance
The Johnny coral seed approach to coral reef restoration: new methodologies appropriate for lower energy reef areas
Authors:
A. P. Kerby
Here's Johnny
Authors:
Steven Goodrick
See all similar
Cited by
3
Threat Modeling Intimate Partner Violence: Tech Abuse as a Cybersecurity Challenge in the Internet of Things
Authors:
Julia Slupska
,
Leonie Maria Tanczer
Secure System? Challenge Accepted: Finding and Resolving Security Failures Using Security Premortems
Authors:
Shamal Faily
,
Simon Parkin
,
John Lyle
Understanding Bifurcation of Slow Versus Fast Cyber-Attackers
Authors:
Maarten H. van Wieren
,
Christian Doerr
,
Vivian Jacobs
…
See all cited by