Quantifying information security risks using expert judgment elicitation
暂无分享,去创建一个
Daniel J. Ryan | Roger M. Cooke | Thomas A. Mazzuchi | Julie J. C. H. Ryan | Juliana Lopez de la Cruz | R. Cooke | T. Mazzuchi | J. D. L. L. Cruz
[1] Roger M. Cooke,et al. On the performance of social network and likelihood-based expert weighting schemes , 2008, Reliab. Eng. Syst. Saf..
[2] Desheng Dash Wu,et al. A risk analysis model in concurrent engineering product development. , 2010, Risk analysis : an official publication of the Society for Risk Analysis.
[3] Robert L. Winkler,et al. An Assessment of the Risk of Chronic Lung Injury Attributable to Long-Term Ozone Exposure , 1995, Oper. Res..
[4] Jason R. W. Merrick,et al. A Risk Management Procedure for the Washington State Ferries , 2001, Risk analysis : an official publication of the Society for Risk Analysis.
[5] R. Cooke. Experts in Uncertainty: Opinion and Subjective Probability in Science , 1991 .
[6] Lawrence Bodin,et al. Information security and risk management , 2008, CACM.
[7] Vedat Verter,et al. Modeling of Transport Risk for Hazardous Materials , 1998, Oper. Res..
[8] Ibrahim Sogukpinar,et al. ISRAM: information security risk analysis method , 2005, Comput. Secur..
[9] Roger M. Cooke,et al. TU Delft expert judgment data base , 2008, Reliab. Eng. Syst. Saf..
[10] J. H. Phillips,et al. Reliability and risk in pressure vessels and piping , 1993 .
[11] Mo Adam Mahmood,et al. Technical opinionAre employees putting your company at risk by not following information security policies? , 2009, Commun. ACM.
[12] Desheng Dash Wu,et al. Enterprise risk management: coping with model risk in a large bank , 2010, J. Oper. Res. Soc..
[13] Roger M. Cooke,et al. Response to discussants , 2008, Reliab. Eng. Syst. Saf..
[14] A. O. Pittenger. Introduction to Stochastic Processes (Erhan Çinlar) , 1977 .
[15] Matthew J. Liberatore,et al. A Survey of Operations Research Models and Applications in Homeland Security , 2006, Interfaces.
[16] Loren Paul Rees,et al. Necessary measures: metric-driven information security risk assessment and decision making , 2007, CACM.
[17] Lara Khansa,et al. Quantifying the benefits of investing in information security , 2009, Commun. ACM.
[18] James J. Heckman. Response to the discussants , 2000 .
[19] Hiroshi Yamazaki,et al. An approach to potential risk analysis of networked chemical plants , 2000 .
[20] Seth D. Guikema,et al. Programmatic Risk Analysis for Critical Engineering Systems Under Tight Resource Constraints , 2003, Oper. Res..
[21] Elizabeth A. Casman,et al. Elicitation of Expert Judgments of Uncertainty in the Risk Assessment of Herbicide‐Tolerant Oilseed Crops , 2004, Risk analysis : an official publication of the Society for Risk Analysis.
[22] Julie J. C. H. Ryan. THE USE , MISUSE , AND ABUSE OF STATISTICS IN INFORMATION SECURITY RESEARCH , 2004 .
[23] Alfredo Garcia,et al. Empirical Analysis of the Effects of Cyber Security Incidents , 2009, Risk analysis : an official publication of the Society for Risk Analysis.
[24] Erhan Çinlar,et al. Introduction to stochastic processes , 1974 .
[25] Arnold Barnett,et al. Free-Flight and en Route Air Safety: A First-Order Analysis , 2000, Oper. Res..