Effective methodology for security risk assessment of computer systems (original) (raw)

Information Security Risk Assessment — A Practical Approach with a Mathematical Formulation of Risk

Sophia Faris

International Journal of Computer Applications, 2014

View PDFchevron_right

ISRAM: information security risk analysis method

Bilge Karabacak

Computers & Security, 2005

View PDFchevron_right

A Novel Approach to Information Security Risk Analysis

Bilge Karabacak

2020

View PDFchevron_right

Information Security Assessment by Quantifying Risk Level of Network Vulnerabilities

Chanchala Joshi

View PDFchevron_right

Decision Support for Assessment of IT-security Risks

Esmiralda Moradian

2013

View PDFchevron_right

Comparative Study of Information Security Risk Assessment Model

Keerti Dixit

International Journal of Computer Applications

View PDFchevron_right

Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements

Sandip Patel

International Journal of Information Management, 2008

View PDFchevron_right

A Hybrid Model for Information Security Risk Assessment

sami haji

International Journal of Advanced Trends in Computer Science and Engineering, 2019

View PDFchevron_right

The Security Risk Assessment Methodology

Tat-Seng Lok

Procedia Engineering, 2012

View PDFchevron_right

Comparative Study of Information Security Risk Assessment Frameworks

Chanchala Joshi

View PDFchevron_right

A Risk Estimation Framework for Security Threats in Computer Networks

Razieh Rezaee

2020

View PDFchevron_right

Information Security Risk Assessment: The Qualitative Versus Quantitative Dilemma

Adrian Munteanu

View PDFchevron_right

Quantitative Security Risk Evaluation using CVSS Metrics by Estimation of Frequency and Maturity of Exploit

Chanchala Joshi

View PDFchevron_right

A Comparative Study on Information Security Risk Analysis Methods

Sodko 3399

View PDFchevron_right

Security Risk Assessment of Software Architecture

Hany Ammar

2011

View PDFchevron_right

Computer and network security risk management: theory, challenges, and countermeasures

noureddine boudriga

International Journal of Communication Systems, 2005

View PDFchevron_right

Quantifying Security Risk by Critical Network Vulnerabilities Assessment

Chanchala Joshi

View PDFchevron_right

Modeling and Assessment of Systems Security

Niklas Hallberg

View PDFchevron_right

An Approach for Modeling Information Systems Security Risk Assessment

Vinod Kumar

Proceedings of the 3rd International Workshop on Security in Information Systems, 2005

View PDFchevron_right

Information Security Risk Assessment

Ievgeniia Kuzminykh

Encyclopedia, 2021

View PDFchevron_right

Analysis of Features and Prospects of Application of Dynamic Iterative Assessment of Information Security Risks (short paper)

Denis Berestov

2021

View PDFchevron_right

Information Security Risks Assessment: A Case Study

Olasunkanmi Amzat

ArXiv, 2018

View PDFchevron_right

Managing Software Security Risks through an Integrated Computational Method

Mohd Nadeem

Intelligent Automation & Soft Computing, 2021

View PDFchevron_right

Cyber-security Risk Assessment

Gregory B. Baecher

2011

View PDFchevron_right

Modeling of Risk Factors in Determining Network Security Level

martin suhartana

International Journal of Security and Its Applications, 2014

View PDFchevron_right

Risk Assessment: Approach to enhance Network Security

Journal of Computer Science IJCSIS

View PDFchevron_right

A framework for evaluating security risk in system design

Paul Wortman

Discover Internet of Things

View PDFchevron_right

A Review : Cyber Security and Risk Assessment

International Journal of Scientific Research in Computer Science, Engineering and Information Technology IJSRCSEIT

International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2023

View PDFchevron_right

Security Meter: A Practical Decision-Tree Model to Quantify Risk

mehmet sahinoglu

IEEE Security and Privacy Magazine, 2005

View PDFchevron_right

The CORAS model-based method for security risk analysis

Gyrd Brændeland

2006

View PDFchevron_right

Efficient Security Measurements and Metrics for Risk Assessment

Tashi Igli

2008

View PDFchevron_right

Mathematical Approach to Security Risk Assessment

Pavel Vazan

Mathematical Problems in Engineering, 2015

View PDFchevron_right

Empirical and statistical analysis of risk analysis-driven techniques for threat management

Bart De Win

The Second International Conference on Availability, Reliability and Security (ARES'07), 2007

View PDFchevron_right

Considering Application Vulnerabilities in Risk Assessment and Management

Fabrizio Baiardi

2016

View PDFchevron_right