Sciweavers

575 search results - page 6 / 115
» A model for evaluating IT security investments
Sort
View
FSKD
2006
Springer
125views Fuzzy Logic» more  FSKD 2006»
15 years 1 months ago
Towards Security Evaluation Based on Evidence Collection
Information security evaluation of software-intensive systems typically relies heavily on the experience of the security professionals. Obviously, automated approaches are needed ...
Reijo Savola
FSKD
2005
Springer
102views Fuzzy Logic» more  FSKD 2005»
15 years 3 months ago
A Fuzzy Mixed Projects and Securities Portfolio Selection Model
The business environment is full of uncertainties. Investing in various asset classes may lower the risk of overall portfolio and increase the potential for greater returns. In thi...
Yong Fang, K. K. Lai, Shouyang Wang
ICSE
2007
IEEE-ACM
15 years 9 months ago
Stakeholder Value Driven Threat Modeling for Off the Shelf Based Systems
er abstract summarizes the Threat Modeling method based on Attacking Path Analysis (T-MAP) which quantifies and prioritizes security threats by calculating the total severity weig...
Yue Chen
SIGMETRICS
2008
ACM
119views Hardware» more  SIGMETRICS 2008»
14 years 9 months ago
Network externalities and the deployment of security features and protocols in the internet
Getting new security features and protocols to be widely adopted and deployed in the Internet has been a continuing challenge. There are several reasons for this, in particular ec...
Marc Lelarge, Jean Bolot