[1]
|
Exploration of the Project Risk Management Framework for Information Technology Companies
|
|
CogITo Smart Journal,
2023 |
|
|
[2]
|
IoT and Big Data Security Issues and Challenges: A Technological Perspective
|
|
… and Applied Sciences …,
2023 |
|
|
[3]
|
Leveraging big data analytics in 5G‐enabled IoT and industrial IoT for the development of sustainable smart cities
|
|
Transactions on …,
2022 |
|
|
[4]
|
User Centric Block-Level Attribute Based Encryption in Cloud Using Blockchains.
|
|
Computer Systems Science …,
2022 |
|
|
[5]
|
Managing Security-Risks for Improving Security-Durability of Institutional Web-Applications: Design Perspective.
|
|
Computers, Materials & …,
2021 |
|
|
[6]
|
情報セキュリティインシデント抑制のための ISO/IEC 27001 規格の活用に関する研究
|
|
2021 |
|
|
[7]
|
Importance of Timely and Efficient Data Collection Process in Security Risk Management
|
|
2021 |
|
|
[8]
|
Managing Software Security Risks through an Integrated Computational Method
|
|
2021 |
|
|
[9]
|
Managing Security-Risks for Improving Security-Durability of Institutional Web-Applications: Design Perspective
|
|
2021 |
|
|
[10]
|
A Systematic Review: Vulnerability Assessment of Wi-Fi in Educational
|
|
2020 |
|
|
[11]
|
Security Risk Analysis based on Data Criticality
|
|
2020 |
|
|
[12]
|
A Systematic Review: Vulnerability Assessment of Wi-Fi in Educational Institution
|
|
2020 |
|
|
[13]
|
Defining organisational information security culture—Perspectives from academia and industry
|
|
2020 |
|
|
[14]
|
An Approach to Basic Requirements for Maintaining the Software Applications used in Nuclear Facilities
|
|
2020 |
|
|
[15]
|
INFORMATION SECURITY RISK MANAGEMENT: A SYSTEMATIC LITERATURE REVIEW.
|
|
2019 |
|
|
[16]
|
A New Method for Assets Sensitivity Calculation and Technical Risks Assessment in the Information Systems
|
|
2019 |
|
|
[17]
|
New method for assets sensitivity calculation and technical risks assessment in the information systems
|
|
2019 |
|
|
[18]
|
Information Structure Framework for ISMS Planning and Certification: Malaysian Data
|
|
2018 |
|
|
[19]
|
System Simulation of a Bayesian Network-Based Performance Prediction Model for Data Communication Networks
|
|
2018 |
|
|
[20]
|
MedDevRisk: Risk Analysis Methodology for Networked Medical Devices
|
|
2018 |
|
|
[21]
|
The Cybersecurity Framework as an Effective Information Security Baseline: A Qualitative Exploration
|
|
2018 |
|
|
[22]
|
Verification and Validation Techniques for Streaming Big Data Analytics in Internet ofThings Environment
|
|
2018 |
|
|
[23]
|
Verification and validation techniques for streaming big data analytics in internet of things environment
|
|
2018 |
|
|
[24]
|
ICT Risk Management Methodology Proposal for Governmental Entities Based on ISO/IEC 27005
|
|
2018 |
|
|
[25]
|
Survey of Information Security Risk Management Models
|
|
International Journal of Business, Humanities and Technology,
2017 |
|
|
[26]
|
Integrating relational data frameworks into risk assessment of networked medical devices
|
|
ProQuest Dissertations Publishing,
2017 |
|
|
[27]
|
Examine the relationship between information technology governance, control objectives for information and related technologies, ISO 27001/27002, and risk …
|
|
ProQuest Dissertations Publishing,
2017 |
|
|
[28]
|
Examine the relationship between information technology governance, control objectives for information and related technologies, ISO 27001/27002, and risk …
|
|
2017 |
|
|
[29]
|
Implementation of cyber security for safety systems of nuclear facilities
|
|
Progress in Nuclear Energy,
2016 |
|
|
[30]
|
Taxonomy of information security risk assessment (ISRA)
|
|
Computers & Security,
2016 |
|
|
[31]
|
ICT Readiness for Business Continuity in local government
|
|
2016 |
|
|
[32]
|
An Exploration of Wireless Networking and the Management of Associated Security Risk
|
|
Walden Dissertations and Doctoral Studies,
2015 |
|
|
[33]
|
Using Application of Dezert-Smarandache Theory on a new framework for protecting MANET
|
|
2015 |
|
|
[34]
|
Network cybersecurity indicators: Determining cybersecurity indicators that accurately reflect the state of cybersecurity of a network
|
|
ProQuest Dissertations Publishing,
2015 |
|
|
[35]
|
Control priorization model for improving information security risk assessment
|
|
2014 |
|
|
[36]
|
Research on the calculation method of information security risk assessment considering human reliability
|
|
Reliability, Maintainability and Safety (ICRMS), 2014 International Conference on,
2014 |
|
|
[37]
|
An Adaptive Decision-Support Model for Data Communication Network Security Risk Management
|
|
International Journal of Computer Applications,
2014 |
|
|
[38]
|
System lifecycle processes for cyber security in a research reactor facility
|
|
Science China Information Sciences,
2014 |
|
|
[39]
|
Cultivating of Human's Behavior Toward Security Effectiveness in Health Information System
|
|
AB Shahri, Z Ismail, NZ Rahim,
2014 |
|
|
[40]
|
A DEVELOPMENT FRAMEWORK FOR SOFTWARE SECURITY IN NUCLEAR SAFETY SYSTEMS: INTEGRATING SECURE DEVELOPMENT AND SYSTEM SECURITY ACTIVITIES
|
|
NUCLEAR ENGINEERING AND TECHNOLOGY,
2014 |
|
|
[41]
|
CONTROL PRIORITIZATION MODEL FOR IMPROVING INFORMATION SECURITY RISK ASSESSMENT
|
|
2014 |
|
|
[42]
|
Exploring information technology security requirements for academic institutions to reduce information security attacks, breaches, and threats
|
|
2014 |
|
|
[43]
|
Electric power information system security risk assessment based on fuzzy rating multilevel analysis
|
|
Instrumentation and Measurement, Sensor Network and Automation (IMSNA), 2013 2nd International Symposium on. IEEE,
2013 |
|
|
[44]
|
A graded approach to cyber security in a research reactor facility
|
|
Progress in Nuclear Energy,
2013 |
|
|
[45]
|
Risk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective
|
|
2013 |
|
|