ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
An Improved Information-Security Risk Assessment Algorithm for a Hybrid Model
International Journal of Advancements in Computing Technology
◽
10.4156/ijact.vol5.issue2.33
◽
2013
◽
Vol 5
(2)
◽
pp. 250-257
◽
Cited By ~ 2
Author(s):
KONG Linjun
Keyword(s):
Risk Assessment
◽
Information Security
◽
Hybrid Model
◽
Security Risk
◽
Information Security Risk
◽
Security Risk Assessment
Download Full-text
Related Documents
Cited By
References
A Hybrid Model for Information Security Risk Assessment
International Journal of Advanced Trends in Computer Science and Engineering
◽
10.30534/ijatcse/2019/1981.12019
◽
2019
◽
pp. 100-106
◽
Cited By ~ 1
Author(s):
Sami Haji
◽
◽
Qing Tan
◽
Rebeca Soler Costa
◽
◽
...
Keyword(s):
Risk Assessment
◽
Information Security
◽
Hybrid Model
◽
Security Risk
◽
Information Security Risk
◽
Security Risk Assessment
Download Full-text
Information Security Risk Assessment Based on Cloud Computing and BP Neural Network
Advances in Intelligent Systems and Computing - Cyber Security Intelligence and Analytics
◽
10.1007/978-3-030-43306-2_13
◽
2020
◽
pp. 85-91
Author(s):
Zheng Zhang
Keyword(s):
Neural Network
◽
Risk Assessment
◽
Cloud Computing
◽
Information Security
◽
Bp Neural Network
◽
Security Risk
◽
Information Security Risk
◽
Security Risk Assessment
Download Full-text
Information Security Risk Assessment Basics
The Security Risk Assessment Handbook
◽
10.1201/9781420031232.ch2
◽
2005
◽
pp. 27-40
Keyword(s):
Risk Assessment
◽
Information Security
◽
Security Risk
◽
Information Security Risk
◽
Security Risk Assessment
Download Full-text
Information Security Risk Assessment Based on Analytic Hierarchy Process and Fuzzy Comprehensive
2008 International Conference on Risk Management & Engineering Management
◽
10.1109/icrmem.2008.71
◽
2008
◽
Author(s):
Long Xiao
◽
Yong Qi
◽
Qianmu Li
Keyword(s):
Risk Assessment
◽
Information Security
◽
Analytic Hierarchy Process
◽
Security Risk
◽
Analytic Hierarchy
◽
Information Security Risk
◽
Security Risk Assessment
◽
Hierarchy Process
Download Full-text
Information Security Risk Assessment: Risk Assessment
Information Security Risk Assessments
◽
10.1016/b978-1-59-749735-0.00005-1
◽
2012
◽
pp. 147-175
Author(s):
Mark Talabis
◽
Jason Martin
Keyword(s):
Risk Assessment
◽
Information Security
◽
Security Risk
◽
Information Security Risk
◽
Security Risk Assessment
Download Full-text
Information security risk assessment methods for the transportation industry
10.1117/12.2613964
◽
2021
◽
Author(s):
Jing Deng
◽
LaiQiang Song
◽
XiaoBo Wu
Keyword(s):
Risk Assessment
◽
Information Security
◽
Assessment Methods
◽
Security Risk
◽
Transportation Industry
◽
Information Security Risk
◽
Security Risk Assessment
Download Full-text
Enterprise information security risk assessment model
10.1063/5.0071374
◽
2021
◽
Author(s):
O. L. Tsvetkova
◽
A. R. Aidinyan
Keyword(s):
Risk Assessment
◽
Information Security
◽
Assessment Model
◽
Risk Assessment Model
◽
Security Risk
◽
Enterprise Information
◽
Information Security Risk
◽
Security Risk Assessment
Download Full-text
Use Case: Information Security Risk Assessment for Providers of Services in a Virtual Environment
5th EAI International Conference on Management of Manufacturing Systems - EAI/Springer Innovations in Communication and Computing
◽
10.1007/978-3-030-67241-6_30
◽
2021
◽
pp. 379-395
Author(s):
Mario Musa
◽
Petra Zorić
◽
Tibor Mijo Kuljanić
◽
Nikolina Gabelica
Keyword(s):
Risk Assessment
◽
Information Security
◽
Virtual Environment
◽
Use Case
◽
Security Risk
◽
Information Security Risk
◽
Security Risk Assessment
Download Full-text
Information Security Risk Assessment, Aggregation, and Mitigation
Information Security and Privacy - Lecture Notes in Computer Science
◽
10.1007/978-3-540-27800-9_34
◽
2004
◽
pp. 391-401
◽
Cited By ~ 6
Author(s):
Arjen Lenstra
◽
Tim Voss
Keyword(s):
Risk Assessment
◽
Information Security
◽
Security Risk
◽
Information Security Risk
◽
Security Risk Assessment
Download Full-text
Information security risk assessment using the AHP method
IOP Conference Series Materials Science and Engineering
◽
10.1088/1757-899x/710/1/012036
◽
2019
◽
Vol 710
◽
pp. 012036
Author(s):
J Zaburko
◽
J Szulżyk-Cieplak
Keyword(s):
Risk Assessment
◽
Information Security
◽
Security Risk
◽
Ahp Method
◽
Information Security Risk
◽
Security Risk Assessment
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close