[1]
|
A Model for the Evaluation of Critical IT Systems Using Multicriteria Decision-Making with Elements for Risk Assessment
Mathematics,
2021
DOI:10.3390/math9091045
|
|
|
[2]
|
Heuristic for license-aware, performant and energy efficient deployment of multiple software in Cloud architecture
2021 12th International Conference on Information and Communication Systems (ICICS),
2021
DOI:10.1109/ICICS52457.2021.9464578
|
|
|
[3]
|
The Development of a Security Evaluation Model Focused on Information Leakage Protection for Sustainable Growth
Sustainability,
2020
DOI:10.3390/su122410639
|
|
|
[4]
|
A comprehensive people, process and technology (PPT) application model for Information Systems (IS) risk management in small/medium enterprises (SME)
2017 International Conference on Communication Technologies (ComTech),
2017
DOI:10.1109/COMTECH.2017.8065754
|
|
|
[5]
|
Designing utility functions for game-theoretic cloud security assessment: a case for using the common vulnerability scoring system
2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security),
2016
DOI:10.1109/CyberSecPODS.2016.7502351
|
|
|
[6]
|
Technological, Organizational and Environmental Security and Privacy Issues of Big Data: A Literature Review
Procedia Computer Science,
2016
DOI:10.1016/j.procs.2016.09.119
|
|
|
[7]
|
On Development of Platform for Organization Security Threat Analytics and Management (POSTAM) Using Rule-Based Approach
Journal of Software Engineering and Applications,
2016
DOI:10.4236/jsea.2016.912041
|
|
|