Sciweavers

3149 search results - page 36 / 630
» IT security risk management
Sort
View
IJNGC
2010
75views more  IJNGC 2010»
13 years 2 months ago
Measuring Security Risk of Networks Using Attack Graphs
Steven Noel, Lingyu Wang, Anoop Singhal, Sushil Ja...
EUSFLAT
2007
154views Fuzzy Logic» more  EUSFLAT 2007»
13 years 9 months ago
Bounds for Value at Risk for Asymptotically Dependent Assets - the Copula Approach
The theory of copulas provides a useful tool for modeling dependence in risk management. In insurance and finance, as well as in other applications, dependence of extreme events ...
Piotr Jaworski
ICTAI
2003
IEEE
14 years 28 days ago
An Intelligent Early Warning System for Software Quality Improvement and Project Management
One of the main reasons behind unfruitful software development projects is that it is often too late to correct the problems by the time they are detected. It clearly indicates th...
Xiaoqing Frank Liu, Gautam Kane, Monu Bambroo
BDIM
2007
IEEE
99views Business» more  BDIM 2007»
14 years 2 months ago
Model-Based Mitigation of Availability Risks
The assessment and mitigation of risks related to the availability of the IT infrastructure is becoming increasingly important in modern organizations. Unfortunately, present stan...
Emmanuele Zambon, Damiano Bolzoni, Sandro Etalle, ...
LSO
2004
Springer
14 years 1 months ago
Learning How to Manage Risks Using Organizational Knowledge
In spite of being an important software activity, many software organizations present difficulties in managing risks. This happens mainly due to their low maturity level, and becau...
Ricardo de Almeida Falbo, Fabiano Borges Ruy, Glei...