Author:
Khosravi-Farmad Masoud,Ghaemi-Bafghi Abbas
Publisher
Springer Science and Business Media LLC
Subject
Strategy and Management,Computer Networks and Communications,Hardware and Architecture,Information Systems
Reference57 articles.
1. Thomas, PR.: Information security risk analysis, 3rd edition, Auerbach publications, Boco Raton (2010)
2. Ross, R.S.: Guide for conducting risk assessments, Special Publication (NIST SP)-800-30 Rev. 1, (2012)
3. Evan, W.: Security risk management: building an information security risk management program from the ground up, 1st edn. Elsevier, Burlington (2011)
4. Mell, P., et al.: A complete guide to the common vulnerability scoring system version 2.0, Published by FIRST-Forum of Incident Response and Security Teams, vol. 1, (2007)
5. Ammann, P., et al.: Scalable, graph-based network vulnerability analysis, Proceedings of the 9th ACM Conference on Computer and Communications Security, ACM (2002)
Cited by
30 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献