Security Events and Vulnerability Data for Cybersecurity Risk Estimation
Published 2017 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Security Events and Vulnerability Data for Cybersecurity Risk Estimation
Authors
Keywords
-
Journal
RISK ANALYSIS
Volume 37, Issue 8, Pages 1606-1627
Publisher
Wiley
Online
2017-08-12
DOI
10.1111/risa.12864
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- A review of cyber security risk assessment methods for SCADA systems
- (2016) Yulia Cherdantseva et al. COMPUTERS & SECURITY
- Data-Driven System Reliability and Failure Behavior Modeling Using FMECA
- (2016) Hadi Akbarzade Khorshidi et al. IEEE Transactions on Industrial Informatics
- Supervised Aggregative Feature Extraction for Big Data Time Series Regression
- (2016) Gian Antonio Susto et al. IEEE Transactions on Industrial Informatics
- National and Global Risk Studies: How Can the Field of Risk Analysis Contribute?
- (2016) Terje Aven et al. RISK ANALYSIS
- Pareto-Optimal Adversarial Defense of Enterprise Systems
- (2015) Edoardo Serra et al. ACM Transactions on Information and System Security
- Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models
- (2015) Nageswara S. V. Rao et al. RISK ANALYSIS
- Recommendations on the use and design of risk matrices
- (2015) Nijs Jan Duijm SAFETY SCIENCE
- Comparing Vulnerability Severity and Exploits Using Case-Control Studies
- (2014) Luca Allodi et al. ACM Transactions on Information and System Security
- The Operational Role of Security Information and Event Management Systems
- (2014) Sandeep Bhatt et al. IEEE SECURITY & PRIVACY
- A Large-Scale Study of the Time Required to Compromise a Computer System
- (2013) Hannes Holm IEEE Transactions on Dependable and Secure Computing
- Foundational Issues in Risk Assessment and Risk Management
- (2013) Terje Aven et al. RISK ANALYSIS
- SCADA security in the light of Cyber-Warfare
- (2012) A. Nicholson et al. COMPUTERS & SECURITY
- On “Black Swans” and “Perfect Storms”: Risk Analysis and Management When Statistics Are Not Enough
- (2012) Elisabeth Paté-Cornell RISK ANALYSIS
- Dynamic Security Risk Management Using Bayesian Attack Graphs
- (2011) N. Poolsappasit et al. IEEE Transactions on Dependable and Secure Computing
- A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management
- (2011) Jason Merrick et al. RISK ANALYSIS
- An Attack Surface Metric
- (2010) Pratyusa K. Manadhata et al. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
- Cybersecurity for Critical Infrastructures: Attack and Defense Modeling
- (2010) Chee-Wooi Ten et al. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS
- The impact of information security events on the stock value of firms: the effect of contingency factors
- (2010) Ali Alper Yayla et al. JOURNAL OF INFORMATION TECHNOLOGY
- How Probabilistic Risk Assessment Can Mislead Terrorism Risk Analysts
- (2010) Gerald G. Brown et al. RISK ANALYSIS
- Probabilistic Risk Analysis and Terrorism Risk
- (2010) Barry Charles Ezell et al. RISK ANALYSIS
- On Some Recent Definitions and Analysis Frameworks for Risk, Vulnerability, and Resilience
- (2010) Terje Aven RISK ANALYSIS
- Quantifying security risk level from CVSS estimates of frequency and impact
- (2009) Siv Hilde Houmb et al. JOURNAL OF SYSTEMS AND SOFTWARE
- Adversarial Risk Analysis
- (2009) David Rios Insua et al. JOURNAL OF THE AMERICAN STATISTICAL ASSOCIATION
- Hierarchical, model-based risk management of critical infrastructures
- (2009) F. Baiardi et al. RELIABILITY ENGINEERING & SYSTEM SAFETY
- Empirical Analysis of the Effects of Cyber Security Incidents
- (2009) Ginger Davis et al. RISK ANALYSIS
- A Comprehensive Network Security Risk Model for Process Control Networks
- (2009) Matthew H. Henry et al. RISK ANALYSIS
- On the Complex Definition of Risk: A Systems-Based Approach
- (2009) Yacov Y. Haimes RISK ANALYSIS
- Some Limitations of “Risk = Threat × Vulnerability × Consequence” for Risk Analysis of Terrorist Attacks
- (2008) Louis Anthony (Tony) Cox et al. RISK ANALYSIS
- What's Wrong with Risk Matrices?
- (2008) Louis Anthony TonyCox RISK ANALYSIS
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreFind the ideal target journal for your manuscript
Explore over 38,000 international journals covering a vast array of academic fields.
Search