Computer Security Management
IEEE Security and Privacy
The role of Wireless Sensor Networks in the area of Critical Information Infrastructure Protection
Information Security Tech. Report
Security Strength Measurement for Dongle-Protected Software
IEEE Security and Privacy
Assessing the risk of intercepting VoIP calls
Computer Networks: The International Journal of Computer and Telecommunications Networking
Risk assessment in practice: A real case study
Computer Communications
Towards more secure systems: how to combine expert evaluations
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Using game theory to configure P2P SIP
Proceedings of the 3rd International Conference on Principles, Systems and Applications of IP Telecommunications
Defensive configuration with game theory
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
Towards formulation of software project risk radars
International Journal of Business Information Systems
FAME: a firewall anomaly management environment
Proceedings of the 3rd ACM workshop on Assurable and usable security configuration
Objective Risk Evaluation for Automated Security Management
Journal of Network and Systems Management
Return on security investment against cyber attacks on availability
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II
A model for quantitative security measurement and prioritisation of vulnerability mitigation
International Journal of Security and Networks
Hi-index | 0.00 |
Several security risk templates employ nonquantitative attributes to express a risk's severity, which is subjective and void of actual figures. The author's design provides a quantitative technique with an updated repository on vulnerabilities, threats, and countermeasures to calculate risk.