[1]
|
User Centric Block-Level Attribute Based Encryption in Cloud Using Blockchains
Computer Systems Science and Engineering,
2022
DOI:10.32604/csse.2022.022467
|
|
|
[2]
|
Managing Security-Risks for Improving Security-Durability of Institutional Web-Applications: Design Perspective
Computers, Materials & Continua,
2021
DOI:10.32604/cmc.2020.013854
|
|
|
[3]
|
Managing Software Security Risks through an Integrated Computational Method
Intelligent Automation & Soft Computing,
2021
DOI:10.32604/iasc.2021.016646
|
|
|
[4]
|
ICT Risk Management Methodology Proposal for Governmental Entities Based on ISO/IEC 27005
2018 International Conference on eDemocracy & eGovernment (ICEDEG),
2018
DOI:10.1109/ICEDEG.2018.8372361
|
|
|
[5]
|
Taxonomy of information security risk assessment (ISRA)
Computers & Security,
2016
DOI:10.1016/j.cose.2015.11.001
|
|
|
[6]
|
System lifecycle processes for cyber security in a research reactor facility
Science China Information Sciences,
2014
DOI:10.1007/s11432-013-4792-y
|
|
|
[7]
|
A DEVELOPMENT FRAMEWORK FOR SOFTWARE SECURITY IN NUCLEAR SAFETY SYSTEMS: INTEGRATING SECURE DEVELOPMENT AND SYSTEM SECURITY ACTIVITIES
Nuclear Engineering and Technology,
2014
DOI:10.5516/NET.04.2012.061
|
|
|
[8]
|
Research on the calculation method of information security risk assessment considering human reliability
2014 10th International Conference on Reliability, Maintainability and Safety (ICRMS),
2014
DOI:10.1109/ICRMS.2014.7107238
|
|
|
[9]
|
Electric power information system security risk assessment based on fuzzy rating multilevel analysis
2013 2nd International Symposium on Instrumentation and Measurement, Sensor Network and Automation (IMSNA),
2013
DOI:10.1109/IMSNA.2013.6743391
|
|
|
[10]
|
A graded approach to cyber security in a research reactor facility
Progress in Nuclear Energy,
2013
DOI:10.1016/j.pnucene.2013.01.007
|
|
|