Login / Signup

Quantifying security risk by measuring network risk conditions.

Candace Suh-LeeJu-Yeon Jo
Published in: ICIS (2015)
Keyphrases
  • security risks
  • security threats
  • sufficient conditions
  • risk management
  • network structure
  • real time
  • peer to peer
  • database
  • database systems
  • response time
  • information security
  • risk assessment