Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | Next revisionBoth sides next revision |
publications [2012/01/16 22:35] – cedric | publications [2012/01/16 22:36] – cedric |
---|
<html> | <html> |
<ul> | <ul> |
<li>M. Ouedraogo, H. Mouratidis, A. Hecker, C. Bonhomme, D. Khadraoui, D. Preston, "<b>A New Approach to Evaluating Security Assurance</b>", in 7th International Conference on Information Assurance and Security, Melaka, Malaysia, Decembre 2011.</li> | <li>M. Ouedraogo, H. Mouratidis, A. Hecker, C. Bonhomme, D. Khadraoui, D. Preston, "<b>A New Approach to Evaluating Security Assurance</b>", in 7th International Conference on Information Assurance and Security, Melaka, Malaysia, December 2011.</li> |
| |
<li>G. Guemkam, C. Feltus, P. Schmitt, C. Bonhomme, D. Khadraoui, Z. Guessoum, "<b>Reputation Based Dynamic Responsibility to Agent Assignement for Critical Infrastructure</b>". IAT 2011: 272-275</li> | <li>G. Guemkam, C. Feltus, P. Schmitt, C. Bonhomme, D. Khadraoui, Z. Guessoum, "<b>Reputation Based Dynamic Responsibility to Agent Assignement for Critical Infrastructure</b>". IAT 2011: 272-275</li> |