"Proposed Framework for Security Risk Assessment"
written by Zakaria I. Saleh, Heba Refai, Ahmad Mashhour,
published by Journal of Information Security, Vol.2 No.2, 2011
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] A Systematic Review: Vulnerability Assessment of Wi-Fi in Educational Institution
2020
[2] Security Risk Analysis based on Data Criticality
2020
[3] Defining organisational information security culture—Perspectives from academia and industry
2020
[4] New method for assets sensitivity calculation and technical risks assessment in the information systems
2019
[5] A New Method for Assets Sensitivity Calculation and Technical Risks Assessment in the Information Systems
2019
[6] INFORMATION SECURITY RISK MANAGEMENT: A SYSTEMATIC LITERATURE REVIEW.
2019
[7] Verification and validation techniques for streaming big data analytics in internet of things environment
2018
[8] Verification and Validation Techniques for Streaming Big Data Analytics in Internet ofThings Environment
2018
[9] The Cybersecurity Framework as an Effective Information Security Baseline: A Qualitative Exploration
2018
[10] MedDevRisk: Risk Analysis Methodology for Networked Medical Devices
2018
[11] ICT Risk Management Methodology Proposal for Governmental Entities Based on ISO/IEC 27005
2018
[12] System Simulation of a Bayesian Network-Based Performance Prediction Model for Data Communication Networks
2018
[13] Information Structure Framework for ISMS Planning and Certification: Malaysian Data
2018
[14] Integrating relational data frameworks into risk assessment of networked medical devices
ProQuest Dissertations Publishing, 2017
[15] Examine the relationship between information technology governance, control objectives for information and related technologies, ISO 27001/27002, and risk …
ProQuest Dissertations Publishing, 2017
[16] Survey of Information Security Risk Management Models
International Journal of Business, Humanities and Technology, 2017
[17] Implementation of cyber security for safety systems of nuclear facilities
Progress in Nuclear Energy, 2016
[18] ICT Readiness for Business Continuity in local government
2016
[19] Taxonomy of information security risk assessment (ISRA)
Computers & Security, 2016
[20] Network cybersecurity indicators: Determining cybersecurity indicators that accurately reflect the state of cybersecurity of a network
ProQuest Dissertations Publishing, 2015
[21] Using Application of Dezert-Smarandache Theory on a new framework for protecting MANET
2015
[22] An Exploration of Wireless Networking and the Management of Associated Security Risk
Walden Dissertations and Doctoral Studies, 2015
[23] Control priorization model for improving information security risk assessment
2014
[24] A DEVELOPMENT FRAMEWORK FOR SOFTWARE SECURITY IN NUCLEAR SAFETY SYSTEMS: INTEGRATING SECURE DEVELOPMENT AND SYSTEM SECURITY ACTIVITIES
NUCLEAR ENGINEERING AND TECHNOLOGY, 2014
[25] Cultivating of Human's Behavior Toward Security Effectiveness in Health Information System
AB Shahri, Z Ismail, NZ Rahim, 2014
[26] An Adaptive Decision-Support Model for Data Communication Network Security Risk Management
International Journal of Computer Applications, 2014
[27] Research on the calculation method of information security risk assessment considering human reliability
Reliability, Maintainability and Safety (ICRMS), 2014 International Conference on, 2014
[28] Exploring information technology security requirements for academic institutions to reduce information security attacks, breaches, and threats
2014
[29] System lifecycle processes for cyber security in a research reactor facility
Science China Information Sciences, 2014
[30] A graded approach to cyber security in a research reactor facility
Progress in Nuclear Energy, 2013
[31] Risk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective
2013
[32] Electric power information system security risk assessment based on fuzzy rating multilevel analysis
Instrumentation and Measurement, Sensor Network and Automation (IMSNA), 2013 2nd International Symposium on. IEEE, 2013