To search, Click below search items.
All Published Papers Search Service
Title
The simple information security audit process: SISAP
Author
Bel G. Raggad, Emilio Collar
Vol. 6 No. 6 pp. 189-198
Keywords
Security audit, vulnerability assessment, threats, ISO 17799, nominal audit, risk assessment
Analyzing Network Security using Malefactor Action Graphs
Igor Kotenko, Mikhail Stepashkin
Vol. 6 No. 6 pp. 226-235
Vulnerability Assessment, Risk Assessment, Security Metrics, Network attacks, Management of Computing Security
Vulnerability Analysis through a Graph-based Protection System
Mohammad Ebrahim Rafiei, Rasool Jalili, Hamid Mousavi
Vol. 6 No. 12 pp. 311-319
Vulnerability Analysis, Protection System, Safety Problem, NP-Completeness.
Security Vulnerabilities and Solutions in Mobile WiMAX
Andreas Deininger, Shinsaku Kiyomoto, Jun Kurihara, Toshiaki Tanaka
Vol. 7 No. 11 pp. 7-15
IEEE 802.16e security, multi- and broadcast service, shared key vulnerability, hash chaining solution