-
1
-
-
0006026451
-
Comparing risk analysis methodologies
-
D.T. Lindsay & W.L. Price (Eds.), . North-Holland: Elsevier
-
Anderson, A.M. (1991). Comparing risk analysis methodologies. In D.T. Lindsay & W.L. Price (Eds.), Information Security, (pp. 301-311). North-Holland: Elsevier.
-
(1991)
Information Security
, pp. 301-311
-
-
Anderson, A.M.1
-
2
-
-
0035476791
-
A fuzzy approach to construction project risk assessment and analysis: Construction project risk management system
-
Carr, V. & Tah, J.H.M. (2001). A fuzzy approach to construction project risk assessment and analysis: construction project risk management system. Advances in Engineering Software. 32: 847-857.
-
(2001)
Advances in Engineering Software
, vol.32
, pp. 847-857
-
-
Carr, V.1
Tah, J.H.M.2
-
3
-
-
0030658708
-
Risk analysis: Requirements, conflicts and problems
-
Elsevier Science Ltd
-
Ciechanowicz, Z. (1997). Risk analysis: requirements, conflicts and problems. Computers & Security. 16(3): 223-232. Elsevier Science Ltd.
-
(1997)
Computers & Security
, vol.16
, Issue.3
, pp. 223-232
-
-
Ciechanowicz, Z.1
-
4
-
-
0141903338
-
Operationalizing IT risk management
-
Elsevier Science Ltd
-
Coles, R.S. & Moulton, R. (2003). Operationalizing IT risk management. Computers & Security. 22(6): 487- 493. Elsevier Science Ltd.
-
(2003)
Computers & Security
, vol.22
, Issue.6
, pp. 487-493
-
-
Coles, R.S.1
Moulton, R.2
-
6
-
-
33746475382
-
Risk management: Here to stay
-
USA: Cutter IT J
-
Edrich, C. (2002). Risk management: here to stay. Cutter IT journal. 15(2): 28-30. USA: Cutter IT J.
-
(2002)
Cutter IT Journal
, vol.15
, Issue.2
, pp. 28-30
-
-
Edrich, C.1
-
7
-
-
0034159453
-
Information systems risk management: Key concepts and business processes
-
Elsevier Science Ltd
-
Finne, T. (2000). Information systems risk management: Key concepts and business processes. Computers & Security. 19(3):234-242. Elsevier Science Ltd.
-
(2000)
Computers & Security
, vol.19
, Issue.3
, pp. 234-242
-
-
Finne, T.1
-
8
-
-
0242411475
-
Architectural-level risk analysis using UML
-
IEEE
-
Goseva-Popstojanova, K., Hassan, A., Guedem, A., Abdelmoez, W., Nassar, D.E.M., Ammar, H. & Mili, A. (2003). Architectural-level risk analysis using UML. IEEE Transaction on Software Engineering. 29(10): 946-960. IEEE.
-
(2003)
IEEE Transaction on Software Engineering
, vol.29
, Issue.10
, pp. 946-960
-
-
Goseva-Popstojanova, K.1
Hassan, A.2
Guedem, A.3
Abdelmoez, W.4
Nassar, D.E.M.5
Ammar, H.6
Mili, A.7
-
9
-
-
33749041137
-
Belief-based risk analysis
-
Australia: Australian Computer Society, Inc
-
Josang, A., Bradley, D. & Knapskog, S.J. (2004). Belief-based risk analysis. In Proceedings of the second workshop on Australasian Information security, Data Mining and Web Intelligence and Software Internationalization 32: 63-86. Australia: Australian Computer Society, Inc.
-
(2004)
Proceedings of the Second Workshop on Australasian Information Security, Data Mining and Web Intelligence and Software Internationalization
, vol.32
, pp. 63-86
-
-
Josang, A.1
Bradley, D.2
Knapskog, S.J.3
-
11
-
-
0036522409
-
Risk management - practising what we preach
-
May, C. (2002). Risk Management - Practising what we preach. Computer fraud & security. 8: 10-13.
-
(2002)
Computer Fraud & Security
, vol.8
, pp. 10-13
-
-
May, C.1
-
13
-
-
33747350064
-
Determining possible avenues of approach using ants
-
NM, USA: Univ. New Mexico
-
Svenson, P. & Sidenbladh, H. (2003). Determining possible avenues of approach using ANTS. In Proceedings of the 6th International Conference on Information Fusion (pp. 516-523). NM, USA: Univ. New Mexico.
-
(2003)
th International Conference on Information Fusion
, pp. 516-523
-
-
Svenson, P.1
Sidenbladh, H.2
-
14
-
-
84904251346
-
Checklist-based risk analysis with evidential reasoning
-
M. Dupuy & P. Paradinas (Eds.), Trusted Information. New decade challenge. . MA, USA: Kluwer Academic Publishers
-
Sungbaek, C. & Ciechanowicz, Z. (2001). Checklist-based risk analysis with evidential reasoning. In M. Dupuy & P. Paradinas (Eds.), Trusted Information. New decade challenge. Proceedings of the 16th International Information Security Conference. (277-292). MA, USA: Kluwer Academic Publishers.
-
(2001)
thInternational Information Security Conference
, pp. 277-292
-
-
Sungbaek, C.1
Ciechanowicz, Z.2
-
15
-
-
0141883323
-
Third generation risk management practices
-
February: 9-12. Elsevier Science Ltd
-
Wright, M. (1999). Third generation risk management practices. Computer Fraud & Security. February: 9-12. Elsevier Science Ltd.
-
(1999)
Computer Fraud & Security
-
-
Wright, M.1
-
16
-
-
0037544039
-
Application of fuzzy expert systems in assessing operational risk of software
-
Xu, Z., Khoshgoftaar, T.M. & Allen, E.B. (2003). Application of fuzzy expert systems in assessing operational risk of software. Information and Software Technology. 45: 373-388.
-
(2003)
Information and Software Technology
, vol.45
, pp. 373-388
-
-
Xu, Z.1
Khoshgoftaar, T.M.2
Allen, E.B.3
-
17
-
-
0036612912
-
A methodology for architecture-level reliability risk analysis
-
IEEE
-
Yacoub, S.M. & Ammar, H.H. (2002). A methodology for architecture-level reliability risk analysis. IEEE Transactions on Software Engineering. 28(6): 529-547. IEEE.
-
(2002)
IEEE Transactions on Software Engineering
, vol.28
, Issue.6
, pp. 529-547
-
-
Yacoub, S.M.1
Ammar, H.H.2
-
18
-
-
0016458950
-
The concept of a linguistic variable and its application to approximate reasoning
-
8(4):301-357 (Part II); 9(1): 43-80 (Part III)
-
Zadeh, L.A. (1975). The concept of a linguistic variable and its application to approximate reasoning. Information Sciences. 8(3): 199-249 (Part I); 8(4):301-357 (Part II); 9(1): 43-80 (Part III).
-
(1975)
Information Sciences
, vol.8
, Issue.3 PART I
, pp. 199-249
-
-
Zadeh, L.A.1
-
19
-
-
0022863910
-
Commonsense reasoning based on fuzzy logic
-
New York: ACM Press
-
Zadeh, L.A. (1986). Commonsense reasoning based on fuzzy logic. In Proceedings of the 18th conference on winter simulation. (445-447). New York: ACM Press.
-
(1986)
thConference on Winter Simulation
, pp. 445-447
-
-
Zadeh, L.A.1
|