Author:
Dixit Keerti,Singh Umesh Kumar,Pandya Bhupendra Kumar
Publisher
Springer Nature Switzerland
Reference22 articles.
1. D.F. Gareia, A. Fernandez, Effective methodology for security risk assessment of computer systems. Int. J. Comp. Electr. Autom. Contr. Inform. Eng. 7(8) (2013)
2. J. Wang, M. Neil, N. Fenton, A Bayesian network approach for cybersecurity risk assessment implementing and extending the FAIR model. Comput. Secur. 89, 101659 (2020). https://doi.org/10.1016/j.cose.2019.101659
3. J.S. Hiller, R.S. Russell, The challenge and imperative of private sector cybersecurity: An international comparison. Comput. Law Secur. Rev. 29(3), 236–245 (2013). https://doi.org/10.1016/j.clsr.2013.03.003
4. K.V.D. Kiran, L.S.S. Reddy, V.P. Kumar, K.K.S. Dheeraj, Security risk management in critical informative systems (Conference on IT in Business, Industry and Government, 2014)
5. P. Shedden, A. Ahmad, W. Smith, H. Tscherning, R. Scheepers, Asset identification in information security risk assessment: A business practice approach. Commun. Assoc. Inf. Syst. 30, 297 (2016)