Journal articles on the topic 'Security Risk Analysis'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security Risk Analysis.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Anton, Nicolae, and Anişor Nedelcu. "Security risk analysis and management." MATEC Web of Conferences 178 (2018): 08015. http://dx.doi.org/10.1051/matecconf/201817808015.
Full textGerber, Mariana, and Rossouw von Solms. "From Risk Analysis to Security Requirements." Computers & Security 20, no. 7 (2001): 577–84. http://dx.doi.org/10.1016/s0167-4048(01)00706-4.
Full textKarabacak, Bilge, and Ibrahim Sogukpinar. "ISRAM: information security risk analysis method." Computers & Security 24, no. 2 (2005): 147–59. http://dx.doi.org/10.1016/j.cose.2004.07.004.
Full textGil, César, David Rios Insua, and Jesus Rios. "Adversarial Risk Analysis for Urban Security Resource Allocation." Risk Analysis 36, no. 4 (2016): 727–41. http://dx.doi.org/10.1111/risa.12580.
Full textKuzminykh, Ievgeniia, Bogdan Ghita, Volodymyr Sokolov, and Taimur Bakhshi. "Information Security Risk Assessment." Encyclopedia 1, no. 3 (2021): 602–17. http://dx.doi.org/10.3390/encyclopedia1030050.
Full textLiwång, Hans, Jonas W. Ringsberg, and Martin Norsell. "Quantitative risk analysis – Ship security analysis for effective risk control options." Safety Science 58 (October 2013): 98–112. http://dx.doi.org/10.1016/j.ssci.2013.04.003.
Full textKozhedub, Yuliia. "Analysis of cyber security risk management documents." Collection "Information technology and security" 5, no. 1 (2017): 82–95. http://dx.doi.org/10.20535/2411-1031.2017.5.1.120580.
Full textSchultz, Eugene. "Internet security: Risk analysis, strategies, and firewalls." Network Security 1997, no. 7 (1997): 15. http://dx.doi.org/10.1016/s1353-4858(97)89883-2.
Full textYadav, Dharmendra, Anjali R. Mahajan, and A. Thomas. "Security risk analysis approach for smart grid." International Journal of Smart Grid and Green Communications 1, no. 3 (2018): 206. http://dx.doi.org/10.1504/ijsggc.2018.091349.
Full textYadav, Dharmendra, Anjali R. Mahajan, and A. Thomas. "Security risk analysis approach for smart grid." International Journal of Smart Grid and Green Communications 1, no. 3 (2018): 206. http://dx.doi.org/10.1504/ijsggc.2018.10012425.
Full textLemley, J. R., Vasilis M. Fthenakis, and Paul D. Moskowitz. "Security risk analysis for chemical process facilities." Process Safety Progress 22, no. 3 (2003): 153–62. http://dx.doi.org/10.1002/prs.680220304.
Full textPetersen, Karen Lund. "Risk analysis – A field within security studies?" European Journal of International Relations 18, no. 4 (2011): 693–717. http://dx.doi.org/10.1177/1354066111409770.
Full textAltiok, Tayfur. "Port security/safety, risk analysis, and modeling." Annals of Operations Research 187, no. 1 (2011): 1–3. http://dx.doi.org/10.1007/s10479-011-0849-8.
Full textAn, Peng, and Sheng-hong Li. "Empirical analysis on risk of security investment." Applied Mathematics-A Journal of Chinese Universities 24, no. 2 (2009): 127–34. http://dx.doi.org/10.1007/s11766-009-1831-y.
Full textZahoruyko, L. V., T. A. Martʹyanova, and A. V. Skyrda. "Models of information technology security risk analysis." Optoelectronic information-power technologies 40, no. 2 (2021): 16–20. http://dx.doi.org/10.31649/1681-7893-2020-40-2-16-20.
Full textJiang, Yixin, Yunan Zhang, Aidong Xu, et al. "Security Risk Analysis of Grid Edge Computing." IOP Conference Series: Earth and Environmental Science 693, no. 1 (2021): 012034. http://dx.doi.org/10.1088/1755-1315/693/1/012034.
Full textButun, Ismail, Nuno Pereira, and Mikael Gidlund. "Security Risk Analysis of LoRaWAN and Future Directions." Future Internet 11, no. 1 (2018): 3. http://dx.doi.org/10.3390/fi11010003.
Full textCohen, Fred. "Managing network security — Part 5: Risk management or risk analysis." Network Security 1997, no. 4 (1997): 15–19. http://dx.doi.org/10.1016/s1353-4858(97)80008-6.
Full textFrydman, Maxime, Guifré Ruiz, Elisa Heymann, Eduardo César, and Barton P. Miller. "Automating Risk Analysis of Software Design Models." Scientific World Journal 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/805856.
Full textJabari, Samah, Isam Shahrour, and Jamal khatabi. "Use of Risk Analysis for Water Security Assessment." MATEC Web of Conferences 295 (2019): 02008. http://dx.doi.org/10.1051/matecconf/201929502008.
Full textHu, Liang, and Yun Gen Hu. "Information Security Risk Assessment Analysis of Quantitative Methods." Applied Mechanics and Materials 687-691 (November 2014): 2015–18. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2015.
Full textMalik, Vinita, and Sukhdip Singh. "Security risk management in IoT environment." Journal of Discrete Mathematical Sciences and Cryptography 22, no. 4 (2019): 697–709. http://dx.doi.org/10.1080/09720529.2019.1642628.
Full textLiu, Chang, Fang Wang, and Chang Li Sun. "Information Security Risk and Security Requirement Analysis Based on Interaction Power Mode." Advanced Materials Research 926-930 (May 2014): 1962–65. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.1962.
Full textPetrescu, Anca Gabriela. "Management Approach of Risk Analysis in Information Security." International Journal of Innovation in the Digital Economy 9, no. 3 (2018): 13–26. http://dx.doi.org/10.4018/ijide.2018070102.
Full textAnosov, Roman, Sergey Anosov та Igor Shakhalov. "Сonceptual Model of Information Technology Security Risk Analysis". Voprosy kiberbezopasnosti, № 2(36) (2020): 2–10. http://dx.doi.org/10.21681/2311-3456-2020-2-02-10.
Full textUrdenko, Olexandr. "Systematic analysis of risk management information security measures." Modeling and Information Systems in Economics, no. 98 (November 28, 2019): 182–97. http://dx.doi.org/10.33111/mise.98.18.
Full textZhang, Qiujin, Rong Jiang, Tong Li, Zifei Ma, Ming Yang, and Juan Yang. "Cloud Computing Privacy Security Risk Analysis and Evaluation." Recent Patents on Computer Science 11, no. 1 (2018): 32–43. http://dx.doi.org/10.2174/2213275911666180719121041.
Full textLamiri, Abdenaby, Kamal Gueraoui, and Gamal Zeggwagh. "Risk Analysis of Bitcoin Security Using Ebios Method." International Review of Civil Engineering (IRECE) 9, no. 2 (2018): 63. http://dx.doi.org/10.15866/irece.v9i2.13330.
Full textPasquinucci, Andrea. "Security, risk analysis and governance: a practical approach." Computer Fraud & Security 2007, no. 7 (2007): 12–14. http://dx.doi.org/10.1016/s1361-3723(07)70091-x.
Full textChollet, P. "Optimizing transport security risk analysis/emergency response preparedness." Packaging, Transport, Storage & Security of Radioactive Material 20, no. 3 (2009): 108–10. http://dx.doi.org/10.1179/174651009x449802.
Full textRezvani, Mohsen, Verica Sekulic, Aleksandar Ignjatovic, Elisa Bertino, and Sanjay Jha. "Interdependent Security Risk Analysis of Hosts and Flows." IEEE Transactions on Information Forensics and Security 10, no. 11 (2015): 2325–39. http://dx.doi.org/10.1109/tifs.2015.2455414.
Full textBadenhorst, K. P., and Jan H. P. Eloff. "Computer security methodology: Risk analysis and project definition." Computers & Security 9, no. 4 (1990): 339–46. http://dx.doi.org/10.1016/0167-4048(90)90104-2.
Full textSommestad, Teodor, Mathias Ekstedt, and Pontus Johnson. "A probabilistic relational model for security risk analysis." Computers & Security 29, no. 6 (2010): 659–79. http://dx.doi.org/10.1016/j.cose.2010.02.002.
Full textter Beek, Maurice H., Axel Legay, Alberto Lluch Lafuente, and Andrea Vandin. "Quantitative Security Risk Modeling and Analysis with RisQFLan." Computers & Security 109 (October 2021): 102381. http://dx.doi.org/10.1016/j.cose.2021.102381.
Full textWei, June, Binshan Lin, and Meiga Loho-Noya. "Development of an E-Healthcare Information Security Risk Assessment Method." Journal of Database Management 24, no. 1 (2013): 36–57. http://dx.doi.org/10.4018/jdm.2013010103.
Full textGuarro, Sergio B. "Risk analysis and risk management models for information systems security applications." Reliability Engineering & System Safety 25, no. 2 (1989): 109–30. http://dx.doi.org/10.1016/0951-8320(89)90027-6.
Full textWang, Li Hui. "The Analysis of Enterprise Network Security Problems." Applied Mechanics and Materials 602-605 (August 2014): 3351–54. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.3351.
Full textPyrgies, John. "The UAVs threat to airport security: risk analysis and mitigation." Journal of Airline and Airport Management 9, no. 2 (2019): 63. http://dx.doi.org/10.3926/jairm.127.
Full textJiang, Qing Chao. "Analysis on Wireless LAN Security Issues and Security Implementation." Advanced Materials Research 1030-1032 (September 2014): 1657–59. http://dx.doi.org/10.4028/www.scientific.net/amr.1030-1032.1657.
Full textKriaa, Siwar, Marc Bouissou, and Youssef Laarouchi. "A new safety and security risk analysis framework for industrial control systems." Proceedings of the Institution of Mechanical Engineers, Part O: Journal of Risk and Reliability 233, no. 2 (2018): 151–74. http://dx.doi.org/10.1177/1748006x18765885.
Full textKusrini, Elisa, and Kholida Hanim. "Analysis of Compliance and Supply Chain Security Risks Based on ISO 28001 in a Logistic Service Provider in Indonesia." International Journal of Safety and Security Engineering 11, no. 2 (2021): 135–42. http://dx.doi.org/10.18280/ijsse.110202.
Full textLuo, Feng, Shuo Hou, Xuan Zhang, Zhenyu Yang, and Wenwen Pan. "Security Risk Analysis Approach for Safety-Critical Systems of Connected Vehicles." Electronics 9, no. 8 (2020): 1242. http://dx.doi.org/10.3390/electronics9081242.
Full textLozito, Ken. "Mitigating Risk." International Journal of Business Intelligence Research 2, no. 2 (2011): 67–75. http://dx.doi.org/10.4018/jbir.2011040105.
Full textFilippov, D. L. "Components of physical security risk." Issues of Risk Analysis 16, no. 4 (2019): 82–93. http://dx.doi.org/10.32686/1812-5220-2019-16-4-82-93.
Full textMeriah, Ines, and Latifa Ben Arfa Rabai. "Analysing Information Security Risk Ontologies." International Journal of Systems and Software Security and Protection 11, no. 1 (2020): 1–16. http://dx.doi.org/10.4018/ijsssp.2020010101.
Full textWarren, MJ. "A Risk Analysis Model to Reduce Computer Security Risks Among Healthcare Organizations." Risk Management 3, no. 1 (2001): 27–37. http://dx.doi.org/10.1057/palgrave.rm.8240074.
Full textKaluarachchilage, Pubudu Kalpani Hitigala, Chris P. Tsokos, and Sasith M. Rajasooriya. "Nonhomogeneous Risk Rank Analysis Method for Security Network System." International Journal of Communications, Network and System Sciences 12, no. 01 (2019): 1–10. http://dx.doi.org/10.4236/ijcns.2019.121001.
Full textYANG, Xiao-ming. "Analysis of risk evaluation techniques on information system security." Journal of Computer Applications 28, no. 8 (2008): 1920–23. http://dx.doi.org/10.3724/sp.j.1087.2008.01920.
Full textV.D.Kiran, K., L. S. S. Reddy, and N. Lakshmi Haritha. "A Compartive Analysis on Risk Assessment Information Security Models." International Journal of Computer Applications 82, no. 9 (2013): 41–47. http://dx.doi.org/10.5120/14148-2314.
Full textWu, Cheng-Kuang, and Chongfu Huang. "Using Trust Game for Cross-Strait Security Risk Analysis." Journal of Risk Analysis and Crisis Response 8, no. 2 (2018): 75. http://dx.doi.org/10.2991/jrarc.2018.8.2.3.
Full text