Towards a Hybrid Model for the Evaluation of Critical IT Systems
暂无分享,去创建一个
[1] Davor Maček,et al. Comparisons of Bitcoin Cryptosystem with Other Common Internet Transaction Systems by AHP Technique , 2017 .
[2] Ronald S. Ross. Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy , 2018 .
[3] Shou-Ching Hsiao,et al. The static analysis of WannaCry ransomware , 2018, 2018 20th International Conference on Advanced Communication Technology (ICACT).
[4] Antoine Bouveret. Cyber Risk for the Financial Sector: A Framework for Quantitative Assessment , 2018 .
[6] Slaven Smojver. Selection of Information Security Risk Management Method Using Analytic Hierarchy Process (AHP) , 2011 .
[7] Nina Begičević Ređep,et al. A Systematic Literature Review on the Application of Multicriteria Decision Making Methods for Information Security Risk Assessment , 2020 .
[8] Pearl Brereton,et al. Performing systematic literature reviews in software engineering , 2006, ICSE.
[9] Einar Snekkenes,et al. A framework for estimating information security risk assessment method completeness , 2017, International Journal of Information Security.
[10] Harsh Kumar Verma,et al. Comprehensive Survey on Petya Ransomware Attack , 2017, 2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS).
[11] Ming Xiang He,et al. Information Security Risk Assessment Based on Analytic Hierarchy Process , 2016 .
[12] Stefan Fenz,et al. Current challenges in information security risk management , 2014, Inf. Manag. Comput. Secur..
[13] L. Parthiban,et al. The effect of cybercrime on a Bank's finances , 2014 .
[14] Claudia Biancotti. Cyber Attacks: Preliminary Evidence from the Bank of Italy's Business Surveys , 2017 .
[15] Yu-Lun Huang,et al. An AHP-Based Risk Assessment for an Industrial IoT Cloud , 2018, 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C).
[16] Alan R. Hevner,et al. The Three Cycle View of Design Science , 2007, Scand. J. Inf. Syst..
[17] Simon Samwel Msanjila,et al. A Conceptual Framework for Threat Assessment Based on Organization’s Information Security Policy , 2014 .
[18] Igor V. Anikin,et al. Information security risk assessment and management method in computer networks , 2015, 2015 International Siberian Conference on Control and Communications (SIBCON).
[19] Hongsheng Luo,et al. Information security risk assessment based on two stages decision model with grey synthetic measure , 2015, 2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS).
[20] Samir Chatterjee,et al. A Design Science Research Methodology for Information Systems Research , 2008 .