Sciweavers

405 search results - page 3 / 81
» Avatar-centric Risk Evaluation
Sort
View
ISPEC
2007
Springer
14 years 11 days ago
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols
Denial of Service (DoS) attacks are a virulent type of attack on the availability of networks’ intended services and resources. Defense against DoS attacks has been built into th...
Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyon...
DSOM
2007
Springer
14 years 12 days ago
On the Risk Exposure and Priority Determination of Changes in IT Service Management
This paper deals with the Change Management process within IT Service Management. Change Management includes several activities, some of which need to evaluate the risk exposure as...
Jacques Philippe Sauvé, Rodrigo A. Santos, ...
ICSE
2003
IEEE-ACM
13 years 11 months ago
Tool Support for Scenario-Based Architecture Evaluation
Architectural considerations play a key role in the success of any software-based development project. Architecture evaluation is an early risk reduction method for identifying ri...
Steffen Thiel, Andreas Hein, Heiner Engelhardt
WSC
1998
13 years 7 months ago
Evaluation of Electronic Cash Threat Scenarios Using Micro Dynamic Simulation
This paper discusses the evaluation of the electronic cash counterfeit threat scenarios using micro dynamic simulation. This modeling technique provides information needed for the...
Kazuo J. Ezawa, Gregory Napiorkowski, Mariusz Koss...
ICONS
2009
IEEE
14 years 27 days ago
Ontology-Based Decision Support for Information Security Risk Management
—As e-Business and e-Commerce applications are increasingly exposed to a variety of information security threats, corporate decision makers are increasingly forced to pay attenti...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer