Sciweavers

3149 search results - page 71 / 630
» IT security risk management
Sort
View
ISORC
2003
IEEE
14 years 2 months ago
Metrics and Models for Cost and Quality of Component-Based Software
Quality and risk concerns currently limit the application of commercial off-the-shelf (COTS) software components to non-critical applications. Software metrics can quantify factor...
Sahra Sedigh-Ali, Arif Ghafoor, Raymond A. Paul
ICSE
2003
IEEE-ACM
14 years 2 months ago
Tool Support for Scenario-Based Architecture Evaluation
Architectural considerations play a key role in the success of any software-based development project. Architecture evaluation is an early risk reduction method for identifying ri...
Steffen Thiel, Andreas Hein, Heiner Engelhardt
WSC
1998
13 years 10 months ago
Evaluation of Electronic Cash Threat Scenarios Using Micro Dynamic Simulation
This paper discusses the evaluation of the electronic cash counterfeit threat scenarios using micro dynamic simulation. This modeling technique provides information needed for the...
Kazuo J. Ezawa, Gregory Napiorkowski, Mariusz Koss...
DSS
2006
91views more  DSS 2006»
13 years 9 months ago
Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach
Organizations are making substantial investments in information security to reduce the risk presented by vulnerabilities in their information technology (IT) infrastructure. Howev...
Mukul Gupta, Jackie Rees, Alok R. Chaturvedi, Jie ...
ETRICS
2006
14 years 20 days ago
Do You Trust Your Recommendations? An Exploration of Security and Privacy Issues in Recommender Systems
Recommender systems are widely used to help deal with the problem of information overload. However, recommenders raise serious privacy and security issues. The personal information...
Shyong K. Lam, Dan Frankowski, John Riedl