×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [security metric]
Security Predictions
391 views
Global Cyber Security Capacity Maturity Model - CMM WSIS Forum 2015 – Geneva Dr Maria Bada 25/05/2015
214 views
Optimal Power Flow: Closing the Loop over Corrupted Data André Teixeira, Henrik Sandberg, György Dán, and Karl H. Johansson ACCESS Linnaeus Centre, KTH
214 views
Metrics validation criteria: How do we know when a metric is worthwhile?
43 views
1 Metrics validation criteria: How do we know when a metric is worthwhile? Ben Smith Andy Meneely Laurie Williams
225 views