×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [security metric]
Security Predictions
395 views
Global Cyber Security Capacity Maturity Model - CMM WSIS Forum 2015 – Geneva Dr Maria Bada 25/05/2015
218 views
Optimal Power Flow: Closing the Loop over Corrupted Data André Teixeira, Henrik Sandberg, György Dán, and Karl H. Johansson ACCESS Linnaeus Centre, KTH
217 views
Metrics validation criteria: How do we know when a metric is worthwhile?
46 views
1 Metrics validation criteria: How do we know when a metric is worthwhile? Ben Smith Andy Meneely Laurie Williams
231 views