To search, Click below search items.
All Published Papers Search Service
Title
The simple information security audit process: SISAP
Author
Bel G. Raggad, Emilio Collar
Vol. 6 No. 6 pp. 189-198
Keywords
Security audit, vulnerability assessment, threats, ISO 17799, nominal audit, risk assessment
Response Mechanism for Defending Computer Networks
C. Onwubiko, A.P. Lenaghan
Vol. 6 No. 8 pp. 36-42
Response mechanism, fuzzy responder, human assistance security threats, computer networks
Threat analysis based on the graph of elementary threats
Karel Burda
Vol. 8 No. 12 pp. 66-68
threat analysis, threat tree
Multiple Simultaneous Threat Detection in UNIX Environment
Zafar Sultan
Vol. 9 No. 2 pp. 65-75
Multiple Simultaneous Threat Detection, Intrusion Detection Systems, Bayesian Theory, Dempster Shafer, Multisensor Data Fusion, Extended Dempster Shafer, Set Cover, Set Packing, GEP, UNIX