ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A formal methodology for Enterprise Information Security risk assessment
2013 International Conference on Risks and Security of Internet and Systems (CRiSIS)
◽
10.1109/crisis.2013.6766354
◽
2013
◽
Cited By ~ 5
Author(s):
Jaya Bhattacharjee
◽
Anirban Sengupta
◽
Chandan Mazumdar
Keyword(s):
Risk Assessment
◽
Information Security
◽
Security Risk
◽
Enterprise Information
◽
Information Security Risk
◽
Security Risk Assessment
Download Full-text
Related Documents
Cited By
References
Enterprise information security risk assessment model
10.1063/5.0071374
◽
2021
◽
Author(s):
O. L. Tsvetkova
◽
A. R. Aidinyan
Keyword(s):
Risk Assessment
◽
Information Security
◽
Assessment Model
◽
Risk Assessment Model
◽
Security Risk
◽
Enterprise Information
◽
Information Security Risk
◽
Security Risk Assessment
Download Full-text
Overview of Enterprise Information Needs in Information Security Risk Assessment
2014 IEEE 18th International Enterprise Distributed Object Computing Conference
◽
10.1109/edoc.2014.16
◽
2014
◽
Cited By ~ 7
Author(s):
Matus Korman
◽
Teodor Sommestad
◽
Jonas Hallberg
◽
Johan Bengtsson
◽
Mathias Ekstedt
Keyword(s):
Risk Assessment
◽
Information Security
◽
Information Needs
◽
Security Risk
◽
Enterprise Information
◽
Information Security Risk
◽
Security Risk Assessment
Download Full-text
THE ENTERPRISE INFORMATION SECURITY RISK ASSESSMENT SYSTEM BASED ON FUZZY LOGIC
Proceedings of the O S Popov ОNAT
◽
10.33243/2518-7139-2019-1-1-97-104
◽
2019
◽
Vol 1
(1)
◽
pp. 97-104
Author(s):
Kochetkov A.V.
◽
◽
Gaur T.A.
◽
Mashin V.N.
◽
Keyword(s):
Risk Assessment
◽
Fuzzy Logic
◽
Information Security
◽
Assessment System
◽
Security Risk
◽
Enterprise Information
◽
Information Security Risk
◽
Security Risk Assessment
Download Full-text
Information Security Risk Assessment Based on Cloud Computing and BP Neural Network
Advances in Intelligent Systems and Computing - Cyber Security Intelligence and Analytics
◽
10.1007/978-3-030-43306-2_13
◽
2020
◽
pp. 85-91
Author(s):
Zheng Zhang
Keyword(s):
Neural Network
◽
Risk Assessment
◽
Cloud Computing
◽
Information Security
◽
Bp Neural Network
◽
Security Risk
◽
Information Security Risk
◽
Security Risk Assessment
Download Full-text
Information Security Risk Assessment Basics
The Security Risk Assessment Handbook
◽
10.1201/9781420031232.ch2
◽
2005
◽
pp. 27-40
Keyword(s):
Risk Assessment
◽
Information Security
◽
Security Risk
◽
Information Security Risk
◽
Security Risk Assessment
Download Full-text
Information Security Risk Assessment Based on Analytic Hierarchy Process and Fuzzy Comprehensive
2008 International Conference on Risk Management & Engineering Management
◽
10.1109/icrmem.2008.71
◽
2008
◽
Author(s):
Long Xiao
◽
Yong Qi
◽
Qianmu Li
Keyword(s):
Risk Assessment
◽
Information Security
◽
Analytic Hierarchy Process
◽
Security Risk
◽
Analytic Hierarchy
◽
Information Security Risk
◽
Security Risk Assessment
◽
Hierarchy Process
Download Full-text
Information Security Risk Assessment: Risk Assessment
Information Security Risk Assessments
◽
10.1016/b978-1-59-749735-0.00005-1
◽
2012
◽
pp. 147-175
Author(s):
Mark Talabis
◽
Jason Martin
Keyword(s):
Risk Assessment
◽
Information Security
◽
Security Risk
◽
Information Security Risk
◽
Security Risk Assessment
Download Full-text
Information security risk assessment methods for the transportation industry
10.1117/12.2613964
◽
2021
◽
Author(s):
Jing Deng
◽
LaiQiang Song
◽
XiaoBo Wu
Keyword(s):
Risk Assessment
◽
Information Security
◽
Assessment Methods
◽
Security Risk
◽
Transportation Industry
◽
Information Security Risk
◽
Security Risk Assessment
Download Full-text
Use Case: Information Security Risk Assessment for Providers of Services in a Virtual Environment
5th EAI International Conference on Management of Manufacturing Systems - EAI/Springer Innovations in Communication and Computing
◽
10.1007/978-3-030-67241-6_30
◽
2021
◽
pp. 379-395
Author(s):
Mario Musa
◽
Petra Zorić
◽
Tibor Mijo Kuljanić
◽
Nikolina Gabelica
Keyword(s):
Risk Assessment
◽
Information Security
◽
Virtual Environment
◽
Use Case
◽
Security Risk
◽
Information Security Risk
◽
Security Risk Assessment
Download Full-text
Information Security Risk Assessment, Aggregation, and Mitigation
Information Security and Privacy - Lecture Notes in Computer Science
◽
10.1007/978-3-540-27800-9_34
◽
2004
◽
pp. 391-401
◽
Cited By ~ 6
Author(s):
Arjen Lenstra
◽
Tim Voss
Keyword(s):
Risk Assessment
◽
Information Security
◽
Security Risk
◽
Information Security Risk
◽
Security Risk Assessment
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close