To search, Click below search items.
All Published Papers Search Service
Title
Formal Network Designs for Critical Network Security Systems
Author
Dea-Woo Park
Vol. 6 No. 4 pp. 172-178
Keywords
Critical Systems, Risk Management, Security Requirements, Security Policy, Formal Methods
The simple information security audit process: SISAP
Bel G. Raggad, Emilio Collar
Vol. 6 No. 6 pp. 189-198
Security audit, vulnerability assessment, threats, ISO 17799, nominal audit, risk assessment
Analyzing Network Security using Malefactor Action Graphs
Igor Kotenko, Mikhail Stepashkin
Vol. 6 No. 6 pp. 226-235
Vulnerability Assessment, Risk Assessment, Security Metrics, Network attacks, Management of Computing Security
Risk Leveling of Network Traffic Anomalies
Charlie Isaksson, Yu Meng, Margaret H. Dunham
Vol. 6 No. 6 pp. 258-265
data mining, risk leveling, intrusion detection, anomaly, data stream