2008 |
15 | EE | Dennis Longley,
Mark Branagan,
William J. Caelli,
Lam-for Kwok:
Feasibility of Automated Information Security Compliance Auditing.
SEC 2008: 493-508 |
2006 |
14 | EE | Mark Branagan,
Robert Dawson,
Dennis Longley:
Security Risk Analysis for Complex Systems.
ISSA 2006: 1-12 |
2005 |
13 | EE | Dennis Longley,
Mark Branagan:
Developing Threat Networks for Risk Analysis of Information Systems.
ISSA 2005: 1-10 |
2004 |
12 | | Lam-for Kwok,
Dennis Longley:
Security Modelling for Risk Analysis.
SEC 2004: 29-46 |
2003 |
11 | EE | Peggy P. K. Fung,
Lam-for Kwok,
Dennis Longley:
Electronic Information Security Documentation.
ACSW Frontiers 2003: 25-31 |
2001 |
10 | | Lam-for Kwok,
Peggy P. K. Fung,
Dennis Longley:
Security Documentation.
Conference on Information Security Management & Small Systems Security 2001: 127-140 |
1999 |
9 | EE | Lam-for Kwok,
Dennis Longley:
Information security management and modelling.
Inf. Manag. Comput. Security 7(1): 30-40 (1999) |
1997 |
8 | | Lam-for Kwok,
Dennis Longley:
Code of Practice: A Standard for Information Security Management.
SEC 1997: 78-90 |
1996 |
7 | EE | Lam-for Kwok,
Dennis Longley:
A security officer's workbench.
Computers & Security 15(8): 695-705 (1996) |
1994 |
6 | EE | Alison Anderson,
Dennis Longley,
Lam-for Kwok:
Security Modelling for Organisations.
ACM Conference on Computer and Communications Security 1994: 241-250 |
5 | EE | Dennis Longley,
S. Vasudevan:
Effect of key generators on the automatic search for flaws in key management schemes.
Computers & Security 13(4): 335-347 (1994) |
1993 |
4 | | Alison Anderson,
Dennis Longley,
Alan B. Tickle:
The Risk Data Repository: A Novel Approach to Security Risk Modelling.
SEC 1993: 185-194 |
3 | | Dennis Longley,
Stephen M. Matyas:
Complementarity Attacks and Control Vectors.
IBM Systems Journal 32(2): 321-325 (1993) |
1992 |
2 | | William J. Caelli,
Dennis Longley,
Alan B. Tickle:
A Methodology for Describing Information and Physical Security Architectures.
SEC 1992: 277-296 |
1 | EE | Dennis Longley,
S. Rigby:
An automatic search for security flaws in key management schemes.
Computers & Security 11(1): 75-89 (1992) |