![]() |
| 2008 | ||
|---|---|---|
| 4 | EE | Mariana Gerber, Rossouw von Solms: Information security requirements - Interpreting the legal aspects. Computers & Security 27(5-6): 124-135 (2008) |
| 2005 | ||
| 3 | EE | Mariana Gerber, Rossouw von Solms: Management of risk in the information age. Computers & Security 24(1): 16-30 (2005) |
| 2001 | ||
| 2 | Mariana Gerber, Rossouw von Solms: From Risk Analysis to Security Requirements. Computers & Security 20(7): 577-584 (2001) | |
| 1 | EE | Mariana Gerber, Rossouw von Solms, Paul L. Overbeek: Formalizing information security requirements. Inf. Manag. Comput. Security 9(1): 32-37 (2001) |
| 1 | Paul L. Overbeek | [1] |
| 2 | Rossouw von Solms | [1] [2] [3] [4] |