| 2008 |
| 15 | EE | Dennis Longley,
Mark Branagan,
William J. Caelli,
Lam-for Kwok:
Feasibility of Automated Information Security Compliance Auditing.
SEC 2008: 493-508 |
| 2006 |
| 14 | EE | Mark Branagan,
Robert Dawson,
Dennis Longley:
Security Risk Analysis for Complex Systems.
ISSA 2006: 1-12 |
| 2005 |
| 13 | EE | Dennis Longley,
Mark Branagan:
Developing Threat Networks for Risk Analysis of Information Systems.
ISSA 2005: 1-10 |
| 2004 |
| 12 | | Lam-for Kwok,
Dennis Longley:
Security Modelling for Risk Analysis.
SEC 2004: 29-46 |
| 2003 |
| 11 | EE | Peggy P. K. Fung,
Lam-for Kwok,
Dennis Longley:
Electronic Information Security Documentation.
ACSW Frontiers 2003: 25-31 |
| 2001 |
| 10 | | Lam-for Kwok,
Peggy P. K. Fung,
Dennis Longley:
Security Documentation.
Conference on Information Security Management & Small Systems Security 2001: 127-140 |
| 1999 |
| 9 | EE | Lam-for Kwok,
Dennis Longley:
Information security management and modelling.
Inf. Manag. Comput. Security 7(1): 30-40 (1999) |
| 1997 |
| 8 | | Lam-for Kwok,
Dennis Longley:
Code of Practice: A Standard for Information Security Management.
SEC 1997: 78-90 |
| 1996 |
| 7 | EE | Lam-for Kwok,
Dennis Longley:
A security officer's workbench.
Computers & Security 15(8): 695-705 (1996) |
| 1994 |
| 6 | EE | Alison Anderson,
Dennis Longley,
Lam-for Kwok:
Security Modelling for Organisations.
ACM Conference on Computer and Communications Security 1994: 241-250 |
| 5 | EE | Dennis Longley,
S. Vasudevan:
Effect of key generators on the automatic search for flaws in key management schemes.
Computers & Security 13(4): 335-347 (1994) |
| 1993 |
| 4 | | Alison Anderson,
Dennis Longley,
Alan B. Tickle:
The Risk Data Repository: A Novel Approach to Security Risk Modelling.
SEC 1993: 185-194 |
| 3 | | Dennis Longley,
Stephen M. Matyas:
Complementarity Attacks and Control Vectors.
IBM Systems Journal 32(2): 321-325 (1993) |
| 1992 |
| 2 | | William J. Caelli,
Dennis Longley,
Alan B. Tickle:
A Methodology for Describing Information and Physical Security Architectures.
SEC 1992: 277-296 |
| 1 | EE | Dennis Longley,
S. Rigby:
An automatic search for security flaws in key management schemes.
Computers & Security 11(1): 75-89 (1992) |