Exiting the risk assessment maze: A meta-survey

D Gritzalis, G Iseppi, A Mylonas, V Stavrou - ACM Computing Surveys …, 2018 - dl.acm.org
Organizations are exposed to threats that increase the risk factor of their ICT systems. The
assurance of their protection is crucial, as their reliance on information technology is a …

When security risk assessment meets advanced metering infrastructure: Identifying the appropriate method

M Shokry, AI Awad, MK Abd-Ellah, AAM Khalaf - Sustainability, 2023 - mdpi.com
Leading risk assessment standards such as the NIST SP 800-39 and ISO 27005 state that
information security risk assessment (ISRA) is one of the crucial stages in the risk …

Designing utility functions for game-theoretic cloud security assessment: a case for using the common vulnerability scoring system

L Maghrabi, E Pfluegel, SF Noorji - … International Conference On …, 2016 - ieeexplore.ieee.org
In recent years, cloud computing has emerged as a key computing paradigm because of its
ubiquitous, convenient and scalable on-demand access to a shared pool of computing …

Moving Beyond Frameworks: Stakeholders' Perceptions of Risk Assessment in National Electronic Identity System

J Edu, M Hooper, C Maple, J Crowcroft - 2023 - researchsquare.com
Abstract National Electronic Identity System (NeIDS) has become crucial for verifying the
identities of citizens and granting access to digital services in public and private domains …

RiskSRP: Prioritizing Security Requirements Based on Total Risk Avoidance

AA Abdulrazeg, NM Norwawi… - Advanced Science …, 2017 - ingentaconnect.com
Once a set of security requirements are elicited, they need to be prioritized. Due to
constraints such as development risk, cost, time to market, and security risk avoidance, it can …

[PDF][PDF] MAEVA: A Framework for Attack Incentive Analysis with Application to Game Theoretic Security Assessment

L Maghrabi, E Pfluegel - personales.upv.es
This paper is concerned with the risk assessment of cyber security attacks on an
organisation. We develop the novel attack incentive analysis framework Motive, Ability …

[引用][C] A Bring Your Own Device Risk Assessment Model

MCOS Omboga, TM Muhambe - 2021 - Computer Science Journals (CSJ)

[引用][C] Marco de Referencia y Herramienta para La Evaluación de Seguridad de Aplicaciones en SaaS.

D de León Guillén, M Ángel - Instituto de …, 2021 - Universidad Autónoma de Ciudad …