Login / Signup
Quantifying security risk by measuring network risk conditions.
Candace Suh-Lee
Ju-Yeon Jo
Published in:
ICIS (2015)
Keyphrases
</>
security risks
security threats
sufficient conditions
risk management
network structure
real time
peer to peer
database
database systems
response time
information security
risk assessment