Browse By Person: Branagan, Mark
|Up a level|
Group by: Item Type | Date
Number of items: 9.
Barnes, Paul H., Charles, Michael B., Branagan, Mark A., & Knight, Alistair (2007) Intelligence and Anticipation: Issues in Security, Risk and Crisis Management. International Journal of Risk Assessment & Management, 7(8), pp. 1209-1223.
Foo, Ernest, Branagan, Mark, & Morris, Thomas (2013) A proposed Australian industrial control system security curriculum. In Sprague, Jr., Ralph H. (Ed.) Proceedings of the 2013 46th Hawaii International Conference on System Sciences, IEEE, Wailea, Hawaii, pp. 1754-1762.
Branagan, Mark, Caelli, Bill, Kwok, Lam For, & Longley, Dennis (2008) Feasibility of automated information security compliance auditing. In Jajodia, S, Samarati, P, & Cimato, S (Eds.) Proceedings of the IFIP TC11 23rd International Information Security Conference, 7-10 September, 2008, Milano, Italy.
Marrington, Andrew, Branagan, Mark, & Smith, Jason (2007) Forensic challenges in service oriented architectures. In 2007 Research Network for a Secure Australia : Security Technology Conference, 28 September 2007, Melbourne University, Melbourne, Victoria.
Branagan, Mark, Dawson, Robert, & Longley, Dennis (2006) Security Risk Analysis for Complex Systems. In Venter, H, Eloff, J, Labuschagne, L, & Eloff, M (Eds.) Proceedings of the ISSA 2006 from Insight to Foresight Conference, 5 - 7 July 2006, South Africa, Johannesburg.
Branagan, Mark & Longley, Dennis (2005) Developing Threat Networks for Risk Analysis of Information Systems. In Ventor, H, Eloff, J, & Labuschagne, L (Eds.) ISSA 2005 New Knowledge Today Conference, 29 June - 1 July 2005, South Africa, Sandton.
Branagan, Mark, Caelli, William, & Longley, Dennis (2005) Security Modelling for Risk Assessment. In Mendis, P, Lai, J, & Dawson, E (Eds.) Rcent Advances in Counter-Terrorism Technology and Infrastructure Protection, July 2005, Australia, Canberra.
Branagan, Mark Allan (2012) A risk simulation framework for information infrastructure protection. PhD thesis, Queensland University of Technology.
Kush, Nishchal, Ahmed, Ejaz, Branagan, Mark, & Foo, Ernest (2013) Poisoned GOOSE : Exploiting the GOOSE Protocol to Attack Critical Infrastructure. [Working Paper] (Unpublished)