메뉴 건너뛰기




Volumn 6, Issue 4, 2010, Pages 269-281

Quantifying security threats and their potential impacts: A case study

Author keywords

Cyber security metrics; Information security; Risk management

Indexed keywords

COMPUTATIONAL INFRASTRUCTURE; CYBER SECURITY; E-COMMERCE APPLICATIONS; INFORMATION SECURITY; POTENTIAL IMPACTS; SECURITY THREATS;

EID: 78649317987     PISSN: 16145046     EISSN: 16145054     Source Type: Journal    
DOI: 10.1007/s11334-010-0123-2     Document Type: Article
Times cited : (45)

References (15)
  • 4
    • 2942753973 scopus 로고    scopus 로고
    • Specifying reusable security requirements
    • Firesmith D (2004) Specifying reusable security requirements. J Object Technol 3(1): 61-75.
    • (2004) J Object Technol , vol.3 , Issue.1 , pp. 61-75
    • Firesmith, D.1
  • 5
    • 70350677370 scopus 로고    scopus 로고
    • Requirement elicitation based on goals with security and privacy policies in electronic commerce
    • Porto, Portugal
    • Rocha SVd, Abdelouahab Z, Freire E (2005) Requirement elicitation based on goals with security and privacy policies in electronic commerce. In: Anais do WER05-workshop em Engenharia de Requisitos, Porto, Portugal, pp 63-74.
    • (2005) Anais do WER05-workshop em Engenharia de Requisitos , pp. 63-74
    • Rocha, S.V.D.1    Abdelouahab, Z.2    Freire, E.3
  • 15
    • 78649329896 scopus 로고    scopus 로고
    • Anti virus comparative test No 20, November 2008
    • Anti virus comparative test No 20: http://www. av-comparatives. org, November 2008.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.