skip to main content
Skip header Section
Information Security Risk AnalysisApril 2005
Publisher:
  • Auerbach Publications
  • Imprint of Warren, Gorham and Lamont 31 St. James Avenue Boston, MA
  • United States
ISBN:978-0-8493-3346-0
Published:01 April 2005
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. Le A, Chen Y, Chai K, Vasenev A and Montoya L (2019). Incorporating FAIR into Bayesian Network for Numerical Assessment of Loss Event Frequencies of Smart Grid Cyber Threats, Mobile Networks and Applications, 24:5, (1713-1721), Online publication date: 1-Oct-2019.
  2. Arogundade O, Adeniran O, Jin Z and Xiaoguang Y (2016). Towards Ontological Approach to Security Risk Analysis of Information System, International Journal of Secure Software Engineering, 7:3, (1-25), Online publication date: 1-Jul-2016.
  3. Huang X, Craig P, Lin H and Yan Z (2016). SecIoT, Security and Communication Networks, 9:16, (3083-3094), Online publication date: 10-Nov-2016.
  4. ACM
    Bandopadhyay S, Sengupta A and Mazumdar C A quantitative methodology for information security control gap analysis Proceedings of the 2011 International Conference on Communication, Computing & Security, (537-540)
  5. ACM
    Bartsch S A calculus for the qualitative risk assessment of policy override authorization Proceedings of the 3rd international conference on Security of information and networks, (62-70)
  6. ACM
    Islam S and Dong W Human factors in software security risk management Proceedings of the first international workshop on Leadership and management in software architecture, (13-16)
  7. ACM
    Futcher L and von Solms R Guidelines for secure software development Proceedings of the 2008 annual research conference of the South African Institute of Computer Scientists and Information Technologists on IT research in developing countries: riding the wave of technology, (56-65)
  8. Papadaki K and Polemi N Towards a knowledge-sharing approach for Information Security Risk Management Proceedings of the 2008 conference on Knowledge-Based Software Engineering: Proceedings of the Eighth Joint Conference on Knowledge-Based Software Engineering, (453-461)
  9. ACM
    Bai Y, Summers W and Bosworth E Teaching network risk assessment to online graduate students Proceedings of the 4th annual conference on Information security curriculum development, (1-6)
  10. Stakhanova N, Basu S and Wong J (2007). A taxonomy of intrusion response systems, International Journal of Information and Computer Security, 1:1/2, (169-184), Online publication date: 1-Jan-2007.
  11. ACM
    Beachboard J, Cole A, Mellor M, Hernandez S, Aytes K and Massad N A tentative proposal Proceedings of the 3rd annual conference on Information security curriculum development, (194-196)
  12. ACM
    Mader A and Srinivasan S Curriculum development related to information security policies and procedures Proceedings of the 2nd annual conference on Information security curriculum development, (49-53)
Contributors

Recommendations