Author:
Kheir Nizar,Mahjoub A. Ridha,Naghmouchi M. Yassine,Perrot Nancy,Wary Jean-Philippe
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering
Reference40 articles.
1. Purdy G (2010) ISO 31000: 2009—setting a new standard for risk management. Risk Anal 30(6):881–886
2. EBIOS, Central directorate for information systems security, version,
http://www.ssi.gouv.fr
3. Alberts C J, Behrens S G, Pethia R D, Wilson W R (1999) Operationally critical threat, asset, and vulnerability evaluation (OCTAVE) framework. Version 1.0
4. Mell P, Scarfone K, Romanosky S (2007) A complete guide to the common vulnerability scoring system version 2.0. Published by FIRST-forum of incident response and security teams, 1–23
5. Sheyner OM (2004) Scenario graphs and attack graphs (Doctoral dissertation, US Air Force Research Laboratory)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Survey of Cybersecurity Risks in Online Gambling Industry;EAI/Springer Innovations in Communication and Computing;2024
2. Calculating Business Impact Assessment of Cyber-Threats;2023 IEEE 9th World Forum on Internet of Things (WF-IoT);2023-10-12
3. Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant;International Journal of Information Security;2023-09-19
4. The complex evolution of information quality improvement in competitive market;RAIRO - Operations Research;2023-03
5. CIIA;Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing;2022-04-25