Protecting the Critical National Infrastructure — Developing a Method for the Measurement of Threat Agents in an Information Environment (original) (raw)

Threat and risk assessments

Natasha Tusikov

Strategic Thinking in Criminal Intelligence …, 2008

View PDFchevron_right

Evaluation of Threat Models

IJRASET Publication

International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2023

View PDFchevron_right

Analysis of the relationship between security risk assessment and security threat assessment - identifying gaps in the security body of knowledge

Andrew Markey

View PDFchevron_right

The Security Risk Assessment Methodology

Tat-Seng Lok

Procedia Engineering, 2012

View PDFchevron_right

Threat Assessment

ABHIJIT MITRA

View PDFchevron_right

Assessing Threat Scenarios: Severity, Mitigation, Capability and Response

Luis Vargas

2011

View PDFchevron_right

A Threat Analysis Methodology for Security Evaluation and Enhancement Planning

antonietta stango, Dimitris Kyriazanos

2009 Third International Conference on Emerging Security Information, Systems and Technologies, 2009

View PDFchevron_right

A threat analysis methodology for security evaluation and enhancement

Dimitris Kyriazanos

2015

View PDFchevron_right

A Quantitative Risk Analysis Approach for Deliberate Threats

Nikos Vavoulas, Christos Xenakis

Lecture Notes in Computer Science, 2011

View PDFchevron_right

A Hybrid Model for Information Security Risk Assessment

sami haji

International Journal of Advanced Trends in Computer Science and Engineering, 2019

View PDFchevron_right

Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements

Sandip Patel

International Journal of Information Management, 2008

View PDFchevron_right

Threat Assessment & Remediation Analysis (TARA) Methodology Description Version 1.0 Sponsor: OSD (NII

william de angelis

View PDFchevron_right

Threats and Threat Analysis

Dimitrios Serpanos

Safe and Secure Cyber-Physical Systems and Internet-of-Things Systems, 2019

View PDFchevron_right

Decision Support for Assessment of IT-security Risks

Esmiralda Moradian

2013

View PDFchevron_right

Methodological Recommendations for the Cyber Risks Management

Sergei A. Petrenko

2021

View PDFchevron_right

Quantitative Metrics and Risk Assessment: The Three Tenets Model of Cybersecurity

George Cybenko

Technology Innovation Management Review

View PDFchevron_right

Vulnerability Assessment Methods – A Review

Dr. Hiran V Nath

View PDFchevron_right

Assessing Threats in Cyberspace: Interrogating Methodological Approaches & The Challenges of Today's Complex Risk Environment

Gabriel Brönnimann

Focal report / Crisis and Risk Network (CRN), 2010

View PDFchevron_right

Cyber Operations Rapid Assessment (CORA): Examining the State of Cybersecurity Assessment Methodologies and Introducing a New Alternative

Clem Skorupka

2015

View PDFchevron_right

Information Security Risk Assessment — A Practical Approach with a Mathematical Formulation of Risk

Sophia Faris

International Journal of Computer Applications, 2014

View PDFchevron_right

A new methodology for strategic assessment of transnational threats

Dr Miah Hammond-Errey

Police Practice and Research, 2019

View PDFchevron_right

A cyber attack evaluation methodology

Kosmas Pipyros

View PDFchevron_right

Quantifying security threats and their potential impacts: a case study

Anis Ben Aissa

Innovations in Systems and Software Engineering, 2010

View PDFchevron_right

Comparative Study of Information Security Risk Assessment Frameworks

Chanchala Joshi

View PDFchevron_right

Information Security Risk Management and Risk Assessment Methodology and Tools

Berker Kilic

10 International Conference on Cyber Security and Computer Science (ICONCS 18), 2018, 2018

View PDFchevron_right

From Tradecraft to Profession The Use of Structured Analysis Techniques in Risk and Security Management with a Focus on Analysis of Competing Hypotheses.

Aldric Ludescher

View PDFchevron_right

Empirical and statistical analysis of risk analysis-driven techniques for threat management

Bart De Win

The Second International Conference on Availability, Reliability and Security (ARES'07), 2007

View PDFchevron_right

A Novel Approach to Information Security Risk Analysis

Bilge Karabacak

2020

View PDFchevron_right

Towards an integrated risk analysis security framework according to a systematic analysis of existing proposals

Manuel Serrano

Frontiers of Computer Science

View PDFchevron_right

Effective methodology for security risk assessment of computer systems

Daniel Garcia

View PDFchevron_right

Focal Report 6 - CIP: Assessing Threats in Cyberspace: Interrogating Methodological Approaches & The Challenges of Today's Complex Risk Environment

CSS Risk and Resilience Research Team

View PDFchevron_right

Vulnerability analysis in critical infrastructures: A methodology

Security and Defence Quarterly

2019

View PDFchevron_right