Journal articles on the topic 'Security risk countermeasure'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security risk countermeasure.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Fenz, Stefan, and Thomas Neubauer. "Ontology-based information security compliance determination and control selection on the example of ISO 27002." Information & Computer Security 26, no. 5 (November 12, 2018): 551–67. http://dx.doi.org/10.1108/ics-02-2018-0020.
Full textBaca, Dejan, and Kai Petersen. "Countermeasure graphs for software security risk assessment: An action research." Journal of Systems and Software 86, no. 9 (September 2013): 2411–28. http://dx.doi.org/10.1016/j.jss.2013.04.023.
Full textSato, Naoshi. "Proposal on Measure Against Cyberattack on the Basis of Recent Trend." Journal of Disaster Research 12, no. 5 (September 27, 2017): 1050–59. http://dx.doi.org/10.20965/jdr.2017.p1050.
Full textRowshan, Shahed, William C. Sauntry, Thomas M. Wood, Bruce Churchill, and Steve R. Levine. "Reducing Security Risk for Transportation Management Centers." Transportation Research Record: Journal of the Transportation Research Board 1938, no. 1 (January 2005): 17–24. http://dx.doi.org/10.1177/0361198105193800103.
Full textYazdinejad, Abbas, Behrouz Zolfaghari, Amin Azmoodeh, Ali Dehghantanha, Hadis Karimipour, Evan Fraser, Arthur G. Green, Conor Russell, and Emily Duncan. "A Review on Security of Smart Farming and Precision Agriculture: Security Aspects, Attacks, Threats and Countermeasures." Applied Sciences 11, no. 16 (August 16, 2021): 7518. http://dx.doi.org/10.3390/app11167518.
Full textShang, Jin Rui. "Lanshan Port Environmental Protection Countermeasure Research - Based on the Sustainable Development." Advanced Materials Research 726-731 (August 2013): 3961–67. http://dx.doi.org/10.4028/www.scientific.net/amr.726-731.3961.
Full textFenz, Stefan, Johannes Heurix, Thomas Neubauer, and Fabian Pechstein. "Current challenges in information security risk management." Information Management & Computer Security 22, no. 5 (November 10, 2014): 410–30. http://dx.doi.org/10.1108/imcs-07-2013-0053.
Full textAbimbola, Oni Omoyemi, Akinyemi Bodunde Odunola, Aladesanmi Adegboye Temitope, Ganiyu Adesola Aderounmu, and Kamagaté Beman Hamidja. "An Improved Stochastic Model for Cybersecurity Risk Assessment." Computer and Information Science 12, no. 4 (November 22, 2019): 96. http://dx.doi.org/10.5539/cis.v12n4p96.
Full textViduto, Valentina, Carsten Maple, Wei Huang, and David López-Peréz. "A novel risk assessment and optimisation model for a multi-objective network security countermeasure selection problem." Decision Support Systems 53, no. 3 (June 2012): 599–610. http://dx.doi.org/10.1016/j.dss.2012.04.001.
Full textShao, Weiwei, Jiahong Liu, Haixing Zhang, Dianyi Yan, and Weijia Li. "Countermeasure Analysis on Promoting Drinking Water Safety in Shanshan County, Xinjiang Autonomous Region, China." Water 10, no. 8 (August 2, 2018): 1022. http://dx.doi.org/10.3390/w10081022.
Full textShimizu, Kazuki, and Masashi Negita. "Lessons Learned from Japan’s Response to the First Wave of COVID-19: A Content Analysis." Healthcare 8, no. 4 (October 23, 2020): 426. http://dx.doi.org/10.3390/healthcare8040426.
Full textNifakos, Sokratis, Krishna Chandramouli, Charoula Konstantina Nikolaou, Panagiotis Papachristou, Sabine Koch, Emmanouil Panaousis, and Stefano Bonacina. "Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review." Sensors 21, no. 15 (July 28, 2021): 5119. http://dx.doi.org/10.3390/s21155119.
Full textEle, Bassey, Odey John Adinya, and Obono, I. O. "The Impact of Emerging Wireless Network System and Cybersecurity in A Global Community." Transactions on Networks and Communications 8, no. 5 (October 31, 2020): 26–42. http://dx.doi.org/10.14738/tnc.85.9628.
Full textHausken, Kjell, and Fei He. "On the Effectiveness of Security Countermeasures for Critical Infrastructures." Risk Analysis 36, no. 4 (December 9, 2014): 711–26. http://dx.doi.org/10.1111/risa.12318.
Full textYousuf, Omerah, and Roohie Naaz Mir. "A survey on the Internet of Things security." Information & Computer Security 27, no. 2 (June 12, 2019): 292–323. http://dx.doi.org/10.1108/ics-07-2018-0084.
Full textSu, Zhan Gang. "The Management of High-Rise Building Construction Safety Risks." Advanced Materials Research 1055 (November 2014): 297–300. http://dx.doi.org/10.4028/www.scientific.net/amr.1055.297.
Full textHuu Phuoc Dai, Nguyen, András Kerti, and Zoltán Rajnai. "E-Learning Security Risks and its Countermeasures." Journal of Emerging research and solutions in ICT 1, no. 1 (April 28, 2016): 17–25. http://dx.doi.org/10.20544/ersict.01.16.p02.
Full textYang, Tai-hua, Jing Qin, and Zhi-xiang Li. "Public Safety Risk Assessment of Power Investment Project Based on Fuzzy Set and DS Evidence Theory." E3S Web of Conferences 143 (2020): 02009. http://dx.doi.org/10.1051/e3sconf/202014302009.
Full textFang, Binxing, Jinqiao Shi, Zhongru Wang, and Weiqiang Yu. "AI-Enabled Cyberspace Attacks: Security Risks and Countermeasures." Chinese Journal of Engineering Science 23, no. 3 (2021): 60. http://dx.doi.org/10.15302/j-sscae-2021.03.002.
Full textHamdi, Mohamed, and Noureddine Boudriga. "Computer and network security risk management: theory, challenges, and countermeasures." International Journal of Communication Systems 18, no. 8 (2005): 763–93. http://dx.doi.org/10.1002/dac.729.
Full textFei, Shufan, Zheng Yan, Wenxiu Ding, and Haomeng Xie. "Security Vulnerabilities of SGX and Countermeasures." ACM Computing Surveys 54, no. 6 (July 2021): 1–36. http://dx.doi.org/10.1145/3456631.
Full textKaewunruen, Sakdirat, Hamad Alawad, and Silviu Cotruta. "A Decision Framework for Managing the Risk of Terrorist Threats at Rail Stations Interconnected with Airports." Safety 4, no. 3 (September 1, 2018): 36. http://dx.doi.org/10.3390/safety4030036.
Full textWang, Cheng. "Research on Enterprise Information Security of the ERP System." Applied Mechanics and Materials 380-384 (August 2013): 2539–43. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2539.
Full textLiu, Yuqing, Yuhuai Zhang, Peiqi Duan, Boxin Shi, Zhaofei Yu, Tiejun Huang, and Wen Gao. "Technical Countermeasures for Security Risks of Artificial General Intelligence." Chinese Journal of Engineering Science 23, no. 3 (2021): 75. http://dx.doi.org/10.15302/j-sscae-2021.03.005.
Full textParra, Ramón, Victor Morales Rocha, and Samuel Martínez Magdaleno. "A review of security risks and countermeasures in containers." International Journal of Security and Networks 16, no. 3 (2021): 183. http://dx.doi.org/10.1504/ijsn.2021.10041303.
Full textJiang, Cheng, Bin Yang, Liangliang Zhu, Wenjun Ruan, and Zhenyu Wang. "Research on Risk Early Warning of Integrated Energy Trading Market." E3S Web of Conferences 213 (2020): 02035. http://dx.doi.org/10.1051/e3sconf/202021302035.
Full textChung Yong In. "Security Status and Risk Management Countermeasures of the Republic of Korea." Police Science Journal 11, no. 4 (November 2016): 191–215. http://dx.doi.org/10.16961/polips.2016.11.4.191.
Full textLei, Wang. "Study on Security Countermeasures of Cross-border E-Commerce Payment Risk." Journal of Physics: Conference Series 1616 (August 2020): 012042. http://dx.doi.org/10.1088/1742-6596/1616/1/012042.
Full textShi, An Na, and Su Juan Ge. "The Characteristics of China's Hydropower Projects Overseas Investment Risk and Possible Countermeasures." Applied Mechanics and Materials 672-674 (October 2014): 2132–39. http://dx.doi.org/10.4028/www.scientific.net/amm.672-674.2132.
Full textEt. al., Tarun Dhar Diwan,. "AN INVESTIGATION AND ANALYSIS OF CYBER SECURITY INFORMATION SYSTEMS: LATEST TRENDS AND FUTURE SUGGESTION." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 2 (March 25, 2021): 477–92. http://dx.doi.org/10.17762/itii.v9i2.372.
Full textAbdullah, Zubaile, and Madihah Mohd Saudi. "RAPID-Risk Assessment of Android Permission and Application Programming Interface (API) Call for Android Botnet." International Journal of Engineering & Technology 7, no. 4.15 (October 7, 2018): 49. http://dx.doi.org/10.14419/ijet.v7i4.15.21370.
Full textYao, Dong Liang, and Xiao Qin Liu. "Research on the Cyber Terrorist Attacks and its Impacts on Information Infrastructure Security." Advanced Materials Research 268-270 (July 2011): 2108–15. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.2108.
Full textDíaz de León Guillén, Miguel Ángel, Víctor Morales-Rocha, and Luis Felipe Fernández Martínez. "A systematic review of security threats and countermeasures in SaaS." Journal of Computer Security 28, no. 6 (November 27, 2020): 635–53. http://dx.doi.org/10.3233/jcs-200002.
Full textAliwa, Emad, Omer Rana, Charith Perera, and Peter Burnap. "Cyberattacks and Countermeasures for In-Vehicle Networks." ACM Computing Surveys 54, no. 1 (April 2021): 1–37. http://dx.doi.org/10.1145/3431233.
Full textLi, Biao, Huan Guo Zhang, and Yun Liang Fang. "Research on the Key Technologies of SaaS Information Security." Applied Mechanics and Materials 687-691 (November 2014): 1860–63. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1860.
Full textGupta, Deena Nath, and Rajendra Kumar. "Networking in IoT: Technologies Usage, Security Threats, and Possible Countermeasures." International Journal of Sensors, Wireless Communications and Control 11, no. 6 (August 25, 2021): 619–26. http://dx.doi.org/10.2174/2210327910666210106090826.
Full textVishwakarma, Pinki Prakash, Amiya Kumar Tripathy, and Srikanth Vemuru. "The Fact-Finding Security Examination in NFC-enabled Mobile Payment System." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 3 (June 1, 2018): 1774. http://dx.doi.org/10.11591/ijece.v8i3.pp1774-1780.
Full textArgyropoulos, Nikolaos, Konstantinos Angelopoulos, Haralambos Mouratidis, and Andrew Fish. "Risk-aware decision support with constrained goal models." Information & Computer Security 26, no. 4 (October 8, 2018): 472–90. http://dx.doi.org/10.1108/ics-01-2018-0010.
Full textSamios, Michael, Christos P. Evangelidis, and Emmanouil Serrelis. "Assessment of Information Security Vulnerabilities in Common Seismological Equipment." Seismological Research Letters 92, no. 2A (February 10, 2021): 933–40. http://dx.doi.org/10.1785/0220200151.
Full textSimoncini, Marta. "Regulating Catastrophic Risks by Standards." European Journal of Risk Regulation 2, no. 1 (March 2011): 37–50. http://dx.doi.org/10.1017/s1867299x0000060x.
Full textJouini, Mouna, and Latifa Ben Arfa Rabai. "A Security Framework for Secure Cloud Computing Environments." International Journal of Cloud Applications and Computing 6, no. 3 (July 2016): 32–44. http://dx.doi.org/10.4018/ijcac.2016070103.
Full textDong, Pu, and Si You Wang. "Risks and Countermeasures of the Shale Gas Development in China." Advanced Materials Research 734-737 (August 2013): 1253–56. http://dx.doi.org/10.4028/www.scientific.net/amr.734-737.1253.
Full textSong, Meng Hua. "Analysis of Risks for Virtualization Technology." Applied Mechanics and Materials 539 (July 2014): 374–77. http://dx.doi.org/10.4028/www.scientific.net/amm.539.374.
Full textAbosata, Nasr, Saba Al-Rubaye, Gokhan Inalhan, and Christos Emmanouilidis. "Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications." Sensors 21, no. 11 (May 24, 2021): 3654. http://dx.doi.org/10.3390/s21113654.
Full textJing, Xue Lei. "Application of Network Security Technology in the Internet Finance." Applied Mechanics and Materials 738-739 (March 2015): 1133–36. http://dx.doi.org/10.4028/www.scientific.net/amm.738-739.1133.
Full textYoo, Jincheol, Sangwoo Moon, and Jong-hwa Kim. "Ransomware Threat Countermeasures for the Defense Information System : In terms of Information Security Risk Management." Jouranl of Information and Security 20, no. 5 (December 31, 2020): 75–80. http://dx.doi.org/10.33778/kcsa.2020.20.5.075.
Full textCai, Liang Jun, Lei Huang, and Liu Gen Lv. "Human Factors Reconcile Mechanism and Risk Management Research for Natural Gas and Liquefied Petroleum Gas Distribution Station." Advanced Materials Research 524-527 (May 2012): 2982–86. http://dx.doi.org/10.4028/www.scientific.net/amr.524-527.2982.
Full textXu, Xinpeng, Youjing Wang, and Linshu Li. "Risks and Countermeasures of Flexible Employment in Enterprises under the Sharing Economy." Journal of Asian Research 4, no. 2 (June 3, 2020): p62. http://dx.doi.org/10.22158/jar.v4n2p62.
Full textVennam, Preethi, Pramod T. C., Thippeswamy B. M., Yong-Guk Kim, and Pavan Kumar B. N. "Attacks and Preventive Measures on Video Surveillance Systems: A Review." Applied Sciences 11, no. 12 (June 16, 2021): 5571. http://dx.doi.org/10.3390/app11125571.
Full textWang, Ying Chun, and Sha Chen. "Analysis of Informatization Construction for SMEs with SaaS Model." Advanced Materials Research 187 (February 2011): 652–57. http://dx.doi.org/10.4028/www.scientific.net/amr.187.652.
Full text