Towards a Hybrid Model for the Evaluation of Critical IT Systems

[1]  Davor Maček,et al.  Comparisons of Bitcoin Cryptosystem with Other Common Internet Transaction Systems by AHP Technique , 2017 .

[2]  Ronald S. Ross Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy , 2018 .

[3]  Shou-Ching Hsiao,et al.  The static analysis of WannaCry ransomware , 2018, 2018 20th International Conference on Advanced Communication Technology (ICACT).

[4]  Antoine Bouveret Cyber Risk for the Financial Sector: A Framework for Quantitative Assessment , 2018 .

[6]  Slaven Smojver Selection of Information Security Risk Management Method Using Analytic Hierarchy Process (AHP) , 2011 .

[7]  Nina Begičević Ređep,et al.  A Systematic Literature Review on the Application of Multicriteria Decision Making Methods for Information Security Risk Assessment , 2020 .

[8]  Pearl Brereton,et al.  Performing systematic literature reviews in software engineering , 2006, ICSE.

[9]  Einar Snekkenes,et al.  A framework for estimating information security risk assessment method completeness , 2017, International Journal of Information Security.

[10]  Harsh Kumar Verma,et al.  Comprehensive Survey on Petya Ransomware Attack , 2017, 2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS).

[11]  Ming Xiang He,et al.  Information Security Risk Assessment Based on Analytic Hierarchy Process , 2016 .

[12]  Stefan Fenz,et al.  Current challenges in information security risk management , 2014, Inf. Manag. Comput. Secur..

[13]  L. Parthiban,et al.  The effect of cybercrime on a Bank's finances , 2014 .

[14]  Claudia Biancotti Cyber Attacks: Preliminary Evidence from the Bank of Italy's Business Surveys , 2017 .

[15]  Yu-Lun Huang,et al.  An AHP-Based Risk Assessment for an Industrial IoT Cloud , 2018, 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C).

[16]  Alan R. Hevner,et al.  The Three Cycle View of Design Science , 2007, Scand. J. Inf. Syst..

[17]  Simon Samwel Msanjila,et al.  A Conceptual Framework for Threat Assessment Based on Organization’s Information Security Policy , 2014 .

[18]  Igor V. Anikin,et al.  Information security risk assessment and management method in computer networks , 2015, 2015 International Siberian Conference on Control and Communications (SIBCON).

[19]  Hongsheng Luo,et al.  Information security risk assessment based on two stages decision model with grey synthetic measure , 2015, 2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS).

[20]  Samir Chatterjee,et al.  A Design Science Research Methodology for Information Systems Research , 2008 .