Journal of Information Security
Vol.3 No.2(2012), Paper ID 18830, 8 pages
DOI:10.4236/jis.2012.32020
A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS
Ahmad Bakhtiyari Shahri, Zuraini Ismail
Faculty of Computer Science and Information Systems, Universiti Teknologi Malaysia, Johor Bahru, Malaysia Advanced Informatics School, Universiti Teknologi Malaysia, Johor Bahru, Malaysia
Copyright © 2012 Ahmad Bakhtiyari Shahri, Zuraini Ismail et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
How to Cite this Article
Download citation as EndNote
Copyright © 2024 by authors and Scientific Research Publishing Inc.
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.