Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A comparative study of risk assessment methods, MEHARI & CRAMM with a new formal model of risk assessment (FoMRA) in information systems
I El Fray - … Information Systems and Industrial Management: 11th …, 2012 - Springer
In this article, we present a comparative study of a developed new formal mathematical
model of risk assessment (FoMRA) with expert methods of risk assessment in the …
model of risk assessment (FoMRA) with expert methods of risk assessment in the …
Modifications of the formal risk analysis and assessment for the information system security
Modifications of the Formal Risk Analysis and Assessment for the Information System
Security Page 1 317 INTRODUCTION An analysis of the current state of knowledge shows …
Security Page 1 317 INTRODUCTION An analysis of the current state of knowledge shows …
A practical certificate and identity based encryption scheme and related security architecture
Group encryption schemes based on general access structures can be used to build
advanced IT systems, which store and manage confidential documents. The paper proposes …
advanced IT systems, which store and manage confidential documents. The paper proposes …
A Mathematical Model for Risk Assessment of Social Engineering Attacks.
A Șandor, G Tont, E Simion - TEM Journal, 2022 - ceeol.com
Social engineering is a very common type of malicious activity conducted on cyberspace
that targets both individuals and companies in order to gain access to information or …
that targets both individuals and companies in order to gain access to information or …
Using backward induction techniques in (timed) security protocols verification
This paper shows a new way of automatic verification of properties of untimed and timed
security protocols. To do this we use a modified version of previously introduced formal …
security protocols. To do this we use a modified version of previously introduced formal …
Оцінка ризиків кіберфізичних систем на базі мікроконтролерів
ІВ Ярощук - 2020 - elartu.tntu.edu.ua
Метою кваліфікаційної роботи є удосконалення технології оцінки ризиків інформаційної
безпеки КФС та розроблення рекомендацій щодо оцінки ризиків при прототипуванні …
безпеки КФС та розроблення рекомендацій щодо оцінки ризиків при прототипуванні …
[PDF][PDF] INFORMATION SYSTEM RISK CONTROL METHOD BASED ON OPERATION-FLOW
H Yang, X Cheng - scholar.archive.org
This paper proposes a risk control method based on operation-flow (ORCM) to effectively
control the risk of operation-flow in information systems. This method consists of the risk …
control the risk of operation-flow in information systems. This method consists of the risk …
[PDF][PDF] OCENA BEZPIECZEŃSTWA SYSTEMÓW TELEINFORMATYCZNYCH PRZETWARZAJĄCYCH INFORMACJE NIEJAWNE
D Kacprowicz - bip.zut.edu.pl
Postęp w dziedzinie technologii teleinformatycznych spowodował, że większość
działalności organizacyjnych opiera się na przetwarzaniu informacji w systemach …
działalności organizacyjnych opiera się na przetwarzaniu informacji w systemach …
Nowe podejścia w zarządzaniu ryzykiem dla systemów informacyjnych organizacji
W artykule przedstawiono nowe podejście do zarządzania ryzykiem w systemach
informacyjnych zgodne z wymaganiami norm ISO/IEC. Proponowane podejście ma na celu …
informacyjnych zgodne z wymaganiami norm ISO/IEC. Proponowane podejście ma na celu …
[PDF][PDF] REDESIGNING RISK ANALYSIS. PRINCIPLES FOR A SYSTEMIC APPROACH
C ANUȚA - Bucharest–2016 - iksconference.ro
The traditional risk analysis methodologies are focused on assessing risks' impact and
likelihood based on threat agents' characteristics (eg intents or capabilities) and targets' …
likelihood based on threat agents' characteristics (eg intents or capabilities) and targets' …