—As e-Business and e-Commerce applications are increasingly exposed to a variety of information security threats, corporate decision makers are increasingly forced to pay attenti...
This paper discusses decision making of project funding allocation under uncertain project costs. Because project costs are uncertain and funding allocations may not necessarily ma...
Chung-Li Tseng, Kyle Y. Lin, Satheesh K. Sundarara...
Abstract—Software systems that do not meet their timing constraints can cause risks. In this work, we propose a comprehensive method for assessing the risk of timing failure by e...
Abstract. Information security is a crucial technique for an organization to survive in these days. However, there is no integrated model to assess the security risk quantitatively...
Hoh Peter In, Young-Gab Kim, Taek Lee, Chang-Joo M...