Contents
Academic literature on the topic 'Security Risk Analysis'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security Risk Analysis.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security Risk Analysis"
Anton, Nicolae, and Anişor Nedelcu. "Security risk analysis and management." MATEC Web of Conferences 178 (2018): 08015. http://dx.doi.org/10.1051/matecconf/201817808015.
Full textGerber, Mariana, and Rossouw von Solms. "From Risk Analysis to Security Requirements." Computers & Security 20, no. 7 (2001): 577–84. http://dx.doi.org/10.1016/s0167-4048(01)00706-4.
Full textKarabacak, Bilge, and Ibrahim Sogukpinar. "ISRAM: information security risk analysis method." Computers & Security 24, no. 2 (2005): 147–59. http://dx.doi.org/10.1016/j.cose.2004.07.004.
Full textGil, César, David Rios Insua, and Jesus Rios. "Adversarial Risk Analysis for Urban Security Resource Allocation." Risk Analysis 36, no. 4 (2016): 727–41. http://dx.doi.org/10.1111/risa.12580.
Full textKuzminykh, Ievgeniia, Bogdan Ghita, Volodymyr Sokolov, and Taimur Bakhshi. "Information Security Risk Assessment." Encyclopedia 1, no. 3 (2021): 602–17. http://dx.doi.org/10.3390/encyclopedia1030050.
Full textLiwång, Hans, Jonas W. Ringsberg, and Martin Norsell. "Quantitative risk analysis – Ship security analysis for effective risk control options." Safety Science 58 (October 2013): 98–112. http://dx.doi.org/10.1016/j.ssci.2013.04.003.
Full textKozhedub, Yuliia. "Analysis of cyber security risk management documents." Collection "Information technology and security" 5, no. 1 (2017): 82–95. http://dx.doi.org/10.20535/2411-1031.2017.5.1.120580.
Full textSchultz, Eugene. "Internet security: Risk analysis, strategies, and firewalls." Network Security 1997, no. 7 (1997): 15. http://dx.doi.org/10.1016/s1353-4858(97)89883-2.
Full textYadav, Dharmendra, Anjali R. Mahajan, and A. Thomas. "Security risk analysis approach for smart grid." International Journal of Smart Grid and Green Communications 1, no. 3 (2018): 206. http://dx.doi.org/10.1504/ijsggc.2018.091349.
Full textYadav, Dharmendra, Anjali R. Mahajan, and A. Thomas. "Security risk analysis approach for smart grid." International Journal of Smart Grid and Green Communications 1, no. 3 (2018): 206. http://dx.doi.org/10.1504/ijsggc.2018.10012425.
Full text