Rios Insua et al., 2021 - Google Patents
An adversarial risk analysis framework for cybersecurityRios Insua et al., 2021
View PDF- Document ID
- 17508660906898880613
- Author
- Rios Insua D
- Couce‐Vieira A
- Rubio J
- Pieters W
- Labunets K
- G. Rasines D
- Publication year
- Publication venue
- Risk Analysis
External Links
Snippet
Risk analysis is an essential methodology for cybersecurity as it allows organizations to deal with cyber threats potentially affecting them, prioritize the defense of their assets, and decide what security controls should be implemented. Many risk analysis methods are present in …
- 238000004458 analytical method 0 title abstract description 32
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Rios Insua et al. | An adversarial risk analysis framework for cybersecurity | |
| US10063583B2 (en) | System and method of mitigating cyber attack risks | |
| Rabai et al. | A cybersecurity model in cloud computing environments | |
| Viduto et al. | A novel risk assessment and optimisation model for a multi-objective network security countermeasure selection problem | |
| Halkiopoulos et al. | A digital service for citizens: Multi-parameter optimization model for cost-benefit analysis of cybercrime and cyberdefense | |
| KR20180121460A (en) | Method, apparatus and computer program for security investment considering characteristics of cloud service | |
| Masky et al. | A novel risk identification framework for cloud computing security | |
| Fragnière et al. | Network & cyber security in hospitality and tourism | |
| Islam et al. | Migration goals and risk management in cloud computing: A review of state of the art and survey results on practitioners | |
| Deshpande et al. | Smart secure: a novel risk based maturity model for enterprise risk management during global pandemic | |
| Kaur et al. | Cybersecurity risk in FinTech | |
| US20140359780A1 (en) | Anti-cyber attacks control vectors | |
| Couce-Vieira et al. | An Adversarial Risk Analysis Framework for Cybersecurity. | |
| Barik et al. | RONSI: a framework for calculating return on network security investment | |
| Mejia | Examining the impact of major security breaches on organizational performance: should investing in cybersecurity be a requirement for companies? | |
| Muhati | Factors affecting cyber-security in Kenya–A Case of Small Medium Enterprises | |
| Cyoy | Framework for Effective Management of Cyber Security on E-learning Platforms in Public Universities in Kenya | |
| Kayode et al. | Cost-Benefit Analysis of Cyber-Security Systems | |
| Bartolini et al. | Instrument design for cyber risk assessment in insurability verification | |
| Rowe et al. | Economic analysis of an inadequate cyber security technical infrastructure | |
| Sang | Cybersecurity Assessment Model for Small and Medium Enterprises (SMEs) E-commerce in Kenya | |
| Ewan | The Impact of Budgeting on the Risk of Cybersecurity Insider Threat Actions: From the Perspective of IT Engineers | |
| Taghiyev | Modeling the Process of Evaluation of Information Security Risks and its Methodology by the Application of Computer Systems | |
| Seigneur et al. | OPPRIM: Opportunity-enabled risk management for trust and risk-aware asset access decision-making | |
| Grobler | A Model to assess the Information Security status of an organization with special reference to the Policy Dimension |