共 50 条
- [1] Threat Scenario Dependency-Based Model of Information Security Risk Analysis [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (08): : 93 - 102
- [2] The Information Security Risk Management [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE QUALITY MANAGEMENT,TRANSPORT AND INFORMATION SECURITY, INFORMATION TECHNOLOGIES (IT&QM&IS), 2017, : 106 - 109
- [3] Information security and risk management [J]. COMMUNICATIONS OF THE ACM, 2008, 51 (04) : 64 - 68
- [5] Security through Information Risk Management [J]. IEEE SECURITY & PRIVACY, 2009, 7 (03) : 45 - 52
- [6] The Quantification Management of Information Security Risk [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 10377 - 10380
- [8] A Collaborative Process Based Risk Analysis for Information Security Management Systems [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 182 - 192
- [9] From information security management to enterprise risk management [J]. Lecture Notes in Electrical Engineering, 2015, 313 : 9 - 16
- [10] Enterprise Risk Management and Information Systems Security Risk [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON RISK MANAGEMENT & GLOBAL E-BUSINESS, VOLS I AND II, 2009, : 1 - 5