International Journal of Information Security

, Volume 11, Issue 4, pp 213–213

Message from the guest editors

  • Irfan Ahmed
  • Martin Naedele
  • Bradley Schatz
  • Ryoichi Sasaki
  • Andrew West
Editorial

DOI: 10.1007/s10207-012-0168-3

Cite this article as:
Ahmed, I., Naedele, M., Schatz, B. et al. Int. J. Inf. Secur. (2012) 11: 213. doi:10.1007/s10207-012-0168-3
  • 292 Downloads

Copyright information

© Springer-Verlag 2012

Authors and Affiliations

  • Irfan Ahmed
    • 1
  • Martin Naedele
    • 2
  • Bradley Schatz
    • 3
  • Ryoichi Sasaki
    • 4
  • Andrew West
    • 5
  1. 1.Computer Science DepartmentUniversity of New OrleansNew OrleansUSA
  2. 2.Industrial Software SystemsABB Corporate ResearchBadenSwitzerland
  3. 3.Schatz Forensic, Queensland University of TechnologyBrisbaneAustralia
  4. 4.Tokyo Denki UniversityTokyoJapan
  5. 5.Invensys Operations ManagementBrisbaneAustralia

Personalised recommendations