Cited By
View all- Bang C(2018)Information systems frontiersInformation Systems Frontiers10.1007/s10796-014-9544-z17:1(217-237)Online publication date: 24-Dec-2018
- Wu BWang AGoda BSobiesk EConnolly R(2011)A multi-layer tree model for enterprise vulnerability managementProceedings of the 2011 conference on Information technology education10.1145/2047594.2047661(257-262)Online publication date: 20-Oct-2011
- Wu BWang AClincy VHoganson KGarrido JDasigi V(2011)EVMATProceedings of the 49th annual ACM Southeast Conference10.1145/2016039.2016074(115-120)Online publication date: 24-Mar-2011