Sciweavers

331 search results - page 16 / 67
» Assessing the Risk of IT Outsourcing
Sort
View
85
Voted
HICSS
2009
IEEE
128views Biometrics» more  HICSS 2009»
15 years 2 months ago
Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural Models
To facilitate rational decision making regarding cyber security investments, decision makers need to be able to assess expected losses before and after potential investments. This...
Teodor Sommestad, Mathias Ekstedt, Pontus Johnson
ESSOS
2009
Springer
15 years 5 months ago
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
Laurie Williams, Michael Gegick, Andrew Meneely
VOTEID
2007
Springer
15 years 5 months ago
Assessing Procedural Risks and Threats in e-Voting: Challenges and an Approach
Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats m...
Komminist Weldemariam, Adolfo Villafiorita, Andrea...
KBSE
2005
IEEE
15 years 4 months ago
Automated population of causal models for improved software risk assessment
Recent work in applying causal modeling (Bayesian networks) to software engineering has resulted in improved decision support systems for software project managers. Once the causa...
Peter Hearty, Norman E. Fenton, Martin Neil, Patri...
ESWA
2008
223views more  ESWA 2008»
14 years 11 months ago
Credit risk assessment with a multistage neural network ensemble learning approach
In this study, a multistage neural network ensemble learning model is proposed to evaluate credit risk at the measurement level. The proposed model consists of six stages. In the ...
Lean Yu, Shouyang Wang, Kin Keung Lai