The top documents of roger-johnston
33 Unconventional Security Devices
114 views
Security Maxims (October 2014)
83 views
Journal of Physical Security 7(3)
529 views
Adversarial Safety Analysis
42 views
Choosing and Using Seals
113 views
Countermeasures to GPS Spoofing
57 views
Journal of Physical Security 6(1)
314 views
Insider Threat Mitigation
102 views
Vulnerability Assessment Myths
62 views
Why Security Fails
37 views
Journal of Physical Society 8(1)
25 views