IT confidentiality risk assessment for an architecture-based approach.
Ayse MoraliEmmanuele ZambonSandro EtallePaul L. O. RePublished in: BDIM (2008)
Keyphrases
- risk assessment
- information security
- risk management
- risk analysis
- risk factors
- network security
- decision making
- access control
- economic impact
- neural network
- decision support system
- e government
- intrusion detection
- power plant
- real time
- data sources
- expert systems
- case study
- information systems
- genetic algorithm
- evidence theory