Subject
Law,General Computer Science
Reference31 articles.
1. A quantitative model for information-security risk management;Bojanc;Eng. Manage. J.,2013
2. A review of cyber security risk assessment methods for SCADA systems;Cherdantseva;Comput. Security,2016
3. Coras.sourceforge.net.. The CORAS method. 2018. [online] available at: http://coras.sourceforge.net/ [Accessed 19 Oct. 2018].
4. Cve.mitre.org.. CVE -common vulnerabilities and exposures (CVE). 2018. [online] Available at: https://cve.mitre.org/ [Accessed 19 Oct. 2018].
5. A security risk analysis model for information systems: causal relationships of risk factors and vulnerability propagation analysis;Feng;Inf. Sci.,2014
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献