Aiming at methods' wider adoption: Applicability determinants and metrics
暂无分享,去创建一个
[1] Ina Schieferdecker,et al. A taxonomy of risk-based testing , 2014, International Journal on Software Tools for Technology Transfer.
[2] Frank Werner,et al. Risk Assessment and Security Testing of Large Scale Networked Systems with RACOMAT , 2015, RISK.
[3] Jürgen Großmann,et al. Combining Security Risk Assessment and Security Testing Based on Standards , 2015, RISK.
[4] Pedro Luiz Pizzigatti Corrêa,et al. Considerations about the efficiency and sufficiency of the utilization of the Scrum methodology: A survey for analyzing results for development teams , 2021, Comput. Sci. Rev..
[5] Rex B. Kline,et al. Usability measurement and metrics: A consolidated model , 2006, Software Quality Journal.
[6] Katharina Barkley. Does one size fit all? The applicability of situational crisis communication theory in the Japanese context , 2020 .
[7] Richard T. Watson,et al. Analyzing the Past to Prepare for the Future: Writing a Literature Review , 2002, MIS Q..
[8] Nicholas J. Car,et al. USING decision models to enable better irrigation Decision Support Systems , 2018, Comput. Electron. Agric..
[9] Richard Lippmann,et al. Agent-based simulation for assessing network security risk due to unauthorized hardware , 2015, SpringSim.
[10] Carol M. Barnum. Preparing for usability testing , 2011 .
[11] Jan H. P. Eloff,et al. A comparative framework for risk analysis methods , 1993, Comput. Secur..
[12] Willem E. Saris,et al. Design, Evaluation, and Analysis of Questionnaires for Survey Research , 2007 .
[13] Jin B. Hong,et al. A survey on the usability and practical applications of Graphical Security Models , 2017, Comput. Sci. Rev..
[14] Kevin Jones,et al. A review of cyber security risk assessment methods for SCADA systems , 2016, Comput. Secur..
[15] Eric Walling,et al. Developing successful environmental decision support systems: Challenges and best practices. , 2020, Journal of environmental management.
[16] Joint Task Force Transformation Initiative. Guide for Conducting Risk Assessments , 2012 .
[17] L. Morales,et al. Applicability of LAMDA as classification model in the oil production , 2019, Artificial Intelligence Review.
[18] Pieter H. Hartel,et al. Current established risk assessment methodologies and tools , 2013 .
[19] Eleni Berki,et al. Usability, security and trust in password managers: A quest for user-centric properties and features , 2019, Comput. Sci. Rev..
[20] Bin Tang,et al. Rateless802.11: Extending WiFi applicability in extremely poor channels , 2020, Comput. Networks.
[21] Alan G. Downe,et al. Determinants of computer usage among educators: A comparison between the UTAUT and TAM models , 2011, 2011 National Postgraduate Conference.
[22] C. D. Jaidhar,et al. Applicability of machine learning in spam and phishing email filtering: review and approaches , 2020, Artificial Intelligence Review.
[23] Jason Edwin Stamp,et al. A classification scheme for risk assessment methods. , 2004 .
[24] James R. Lewis,et al. The System Usability Scale: Past, Present, and Future , 2018, Int. J. Hum. Comput. Interact..
[25] Jurek Kirakowski,et al. Measuring the Usability of Web Sites , 1998 .
[26] Les Labuschagne,et al. A framework for comparing different information security risk analysis methodologies , 2005 .
[27] Kent L. Norman,et al. Development of an instrument measuring user satisfaction of the human-computer interface , 1988, CHI '88.
[28] S. Lloyd,et al. Measures of complexity: a nonexhaustive list , 2001 .
[29] Einar Snekkenes,et al. A framework for estimating information security risk assessment method completeness , 2017, International Journal of Information Security.
[30] Jeff Sauro,et al. Standardized Usability Questionnaires , 2012 .
[31] James R. Lewis. Psychometric Evaluation of the Post-Study System Usability Questionnaire: The PSSUQ , 1992 .
[32] James R. Lewis,et al. IBM computer usability satisfaction questionnaires: Psychometric evaluation and instructions for use , 1995, Int. J. Hum. Comput. Interact..
[33] Aleksandr Mylläri,et al. On the Applicability of Pairwise Separations Method in Astronomy: Influence of the Noise in Data , 2019, Math. Comput. Sci..
[34] Ahmed Patel,et al. A review of security assessment methodologies in industrial control systems , 2019, Inf. Comput. Secur..
[35] Geoffrey Hughes,et al. Longman Dictionary of Contemporary English , 2013 .
[36] Pearl Brereton,et al. A systematic review of systematic review process research in software engineering , 2013, Inf. Softw. Technol..
[37] Jan Tyrychtr,et al. The current state of the issue of information needs and dispositions among small Czech farms , 2017 .
[38] Fred D. Davis,et al. User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .
[39] Shingo Asamoto,et al. Applicability of machine learning to a crack model in concrete bridges , 2020, Comput. Aided Civ. Infrastructure Eng..
[40] R. G. N. Meegama,et al. Applicability of a Single Depth Sensor in Real-Time 3D Clothes Simulation: Augmented Reality Virtual Dressing Room Using Kinect Sensor , 2020, Adv. Hum. Comput. Interact..
[41] Alexey L. Lastovetsky,et al. A Survey of Communication Performance Models for High-Performance Computing , 2019, ACM Comput. Surv..
[42] S. Johansson,et al. Digital production innovation projects – The applicability of managerial controls under high levels of complexity and uncertainty , 2020 .
[43] Martin Ibl,et al. Complexity analysis of business processes , 2017, 2017 International Conference on Information and Digital Technologies (IDT).
[44] Harris Papadopoulos,et al. Measures of Complexity , 2015, Springer International Publishing.
[45] Kai Virtanen,et al. On Theoretical Principle and Practical Applicability of Ranked Nodes Method for Constructing Conditional Probability Tables of Bayesian Networks , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[46] Luiza Fabisiak,et al. Comparative Analysis of Information Security Assessment and Management Methods , 2012 .
[47] Vivek Agrawal,et al. A Comparative Study on Information Security Risk Analysis Methods , 2017, J. Comput..
[48] Antonio Ruiz-Martínez,et al. Systematic literature review on the state of the art and future research work in anonymous communications systems , 2017, Comput. Electr. Eng..
[49] Kyungho Lee,et al. An advanced approach to security measurement system , 2015, The Journal of Supercomputing.
[50] Vitor Nazário Coelho,et al. Multi-agent systems applied for energy systems integration: State-of-the-art applications and trends in microgrids , 2017 .
[51] Burkhard Hoppenstedt,et al. Applicability of Immersive Analytics in Mixed Reality: Usability Study , 2019, IEEE Access.
[52] W Wim Zeiler,et al. On the application of multi-agent systems in buildings for improved building operations, performance and smart grid interaction: a survey , 2015 .
[53] Ioannis K. Argyros,et al. Extending the applicability of Newton's method for a class of boundary value problems using the shooting method , 2020, Appl. Math. Comput..
[54] Jorge S. Cardoso,et al. Business Process Control-Flow Complexity: Metric, Evaluation, and Validation , 2008, Int. J. Web Serv. Res..
[55] Marian Makins,et al. Collins English dictionary , 1991 .
[56] Steen Nielsen. Reflections on the applicability of business analytics for management accounting – and future perspectives for the accountant , 2018, Journal of Accounting & Organizational Change.
[57] James R. Lewis,et al. Psychometric evaluation of an after-scenario questionnaire for computer usability studies: the ASQ , 1991, SGCH.
[58] Claudia Eckert,et al. Attack Graph-Based Assessment of Exploitability Risks in Automotive On-Board Networks , 2018, ARES.
[59] Dimitris Gritzalis,et al. Exiting the Risk Assessment Maze , 2018, ACM Comput. Surv..
[60] Giannopoulos Georgios,et al. Risk assessment methodologies for Critical Infrastructure Protection. Part I: A state of the art , 2012 .
[61] Latifa Ben Arfa Rabai,et al. A Survey of Quantitative Security Risk Analysis Models for Computer Systems , 2018, ICAAI 2018.
[62] Victoria Beltran,et al. Decision support systems for agriculture 4.0: Survey and challenges , 2020, Comput. Electron. Agric..
[63] Ivan Martinovic,et al. On the Applicability of Satellite-Based Air Traffic Control Communication for Security , 2019, IEEE Communications Magazine.
[64] Mary Corbett,et al. SUMI: the Software Usability Measurement Inventory , 1993, Br. J. Educ. Technol..
[65] E. G. Domingues,et al. Calculation of system complexity based on the connections: Methodology and applications , 2016, 2016 IEEE 16th International Conference on Environment and Electrical Engineering (EEEIC).
[66] Stephen L. Dorton,et al. Effective Variety? for whom (or what)? A folk theory on interface complexity and situation awareness , 2017, 2017 IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA).
[67] Terje Aven,et al. The risk concept - historical and recent development trends , 2012, Reliab. Eng. Syst. Saf..
[68] J. B. Brooke,et al. SUS: A 'Quick and Dirty' Usability Scale , 1996 .
[69] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[70] Yevgeniya Kovalchuk,et al. Machine learning and multi-agent systems in oil and gas industry applications: A survey , 2019, Comput. Sci. Rev..
[71] Miquel Sànchez-Marrè,et al. Decision support systems (DSS) for wastewater treatment plants - A review of the state of the art. , 2019, Bioresource technology.
[72] Kurt Sandkuhl,et al. An Analysis of Applicability using Quality Metrics for Ontologies on Ontology Design Patterns , 2015, Intell. Syst. Account. Finance Manag..
[73] Václav Kotlan,et al. Applicability and comparison of surrogate techniques for modeling of selected heating problems , 2019, Comput. Math. Appl..