|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 6388 occurrences of 3089 keywords
|
|
|
Results
Found 37669 publication records. Showing 37659 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
40 | Fredrik Seehusen |
Using CAPEC for Risk-Based Security Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RISK ![In: Risk Assessment and Risk-Driven Testing - Third International Workshop, RISK 2015, Berlin, Germany, June 15, 2015. Revised Selected Papers, pp. 77-92, 2015, Springer, 978-3-319-26415-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
40 | Fabrizio Baiardi, Federico Tonelli, Alessandro Bertolini |
CyVar: Extending Var-At-Risk to ICT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RISK ![In: Risk Assessment and Risk-Driven Testing - Third International Workshop, RISK 2015, Berlin, Germany, June 15, 2015. Revised Selected Papers, pp. 49-62, 2015, Springer, 978-3-319-26415-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
40 | Jürgen Großmann, Fredrik Seehusen |
Combining Security Risk Assessment and Security Testing Based on Standards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RISK ![In: Risk Assessment and Risk-Driven Testing - Third International Workshop, RISK 2015, Berlin, Germany, June 15, 2015. Revised Selected Papers, pp. 18-33, 2015, Springer, 978-3-319-26415-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
40 | Alexandre Vernotte, Cornel Botea, Bruno Legeard, Arthur Molnar, Fabien Peureux |
Risk-Driven Vulnerability Testing: Results from eHealth Experiments Using Patterns and Model-Based Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RISK ![In: Risk Assessment and Risk-Driven Testing - Third International Workshop, RISK 2015, Berlin, Germany, June 15, 2015. Revised Selected Papers, pp. 93-109, 2015, Springer, 978-3-319-26415-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
40 | Jürgen Großmann, Michael Berger, Johannes Viehmann |
A Trace Management Platform for Risk-Based Security Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RISK@ICTSS ![In: Risk Assessment and Risk-Driven Testing - First International Workshop, RISK 2013, Held in Conjunction with ICTSS 2013, Istanbul, Turkey, November 12, 2013. Revised Selected Papers, pp. 120-135, 2013, Springer, 978-3-319-07075-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
40 | Gencer Erdogan, Atle Refsdal, Ketil Stølen |
A Systematic Method for Risk-Driven Test Case Design Using Annotated Sequence Diagrams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RISK@ICTSS ![In: Risk Assessment and Risk-Driven Testing - First International Workshop, RISK 2013, Held in Conjunction with ICTSS 2013, Istanbul, Turkey, November 12, 2013. Revised Selected Papers, pp. 93-108, 2013, Springer, 978-3-319-07075-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
40 | Murad Mehmet, Murat Günestas, Duminda Wijesekera |
Dynamic Risk Model of Money Laundering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RISK@ICTSS ![In: Risk Assessment and Risk-Driven Testing - First International Workshop, RISK 2013, Held in Conjunction with ICTSS 2013, Istanbul, Turkey, November 12, 2013. Revised Selected Papers, pp. 3-20, 2013, Springer, 978-3-319-07075-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
40 | Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, Artsiom Yautsiukhin |
Towards Attribute-Based Access Control Policy Engineering Using Risk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RISK@ICTSS ![In: Risk Assessment and Risk-Driven Testing - First International Workshop, RISK 2013, Held in Conjunction with ICTSS 2013, Istanbul, Turkey, November 12, 2013. Revised Selected Papers, pp. 80-90, 2013, Springer, 978-3-319-07075-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
40 | Samson Yoseph Esayas |
Utilizing Security Risk Analysis and Security Testing in the Legal Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RISK@ICTSS ![In: Risk Assessment and Risk-Driven Testing - First International Workshop, RISK 2013, Held in Conjunction with ICTSS 2013, Istanbul, Turkey, November 12, 2013. Revised Selected Papers, pp. 51-67, 2013, Springer, 978-3-319-07075-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
40 | Johannes Viehmann |
Towards Integration of Compositional Risk Analysis Using Monte Carlo Simulation and Security Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RISK@ICTSS ![In: Risk Assessment and Risk-Driven Testing - First International Workshop, RISK 2013, Held in Conjunction with ICTSS 2013, Istanbul, Turkey, November 12, 2013. Revised Selected Papers, pp. 109-119, 2013, Springer, 978-3-319-07075-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
40 | Philipp Zech, Michael Felderer, Ruth Breu |
Security Risk Analysis by Logic Programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RISK@ICTSS ![In: Risk Assessment and Risk-Driven Testing - First International Workshop, RISK 2013, Held in Conjunction with ICTSS 2013, Istanbul, Turkey, November 12, 2013. Revised Selected Papers, pp. 38-48, 2013, Springer, 978-3-319-07075-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
39 | Dapeng Liu, Qing Wang 0001, Junchao Xiao |
The role of software process simulation modeling in software risk management: A systematic review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESEM ![In: Proceedings of the Third International Symposium on Empirical Software Engineering and Measurement, ESEM 2009, October 15-16, 2009, Lake Buena Vista, Florida, USA, pp. 302-311, 2009, IEEE Computer Society, 978-1-4244-4842-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
39 | Adrian Kotelba, Aarne Mämmelä |
Application of Financial Risk-Reward Theory to Adaptive Transmission. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTC Spring ![In: Proceedings of the 67th IEEE Vehicular Technology Conference, VTC Spring 2008, 11-14 May 2008, Singapore, pp. 1756-1760, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Xiaolin Cui, Xiaobin Tan, Yong Zhang, Hongsheng Xi |
A Markov Game Theory-Based Risk Assessment Model for Network Information System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 1057-1061, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Jianhui Wang |
Risk-Constrained Generation Asset Scheduling for Price-Takers in the Electricity Markets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), Proceedings, 7-10 January 2008, Waikoloa, Big Island, HI, USA, pp. 92, 2008, IEEE Computer Society, 0-7695-3075-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Debasis Mitra 0001 |
Stochastic traffic engineering for demand uncertainty and risk-aware network revenue management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS ![In: Proceedings of the International Conference on Measurements and Modeling of Computer Systems, SIGMETRICS 2004, June 10-14, 2004, New York, NY, USA, pp. 1, 2004, ACM, 1-58113-873-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
39 | Ram Dantu, Kall Loper, Prakash Kolan |
Risk Management using Behavior based Attack Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 1, April 5-7, 2004, Las Vegas, Nevada, USA, pp. 445-449, 2004, IEEE Computer Society, 0-7695-2108-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
39 | Jan A. M. Wiegerinck |
Introduction to the risk based design of safety instrumented systems for the process industry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICARCV ![In: Seventh International Conference on Control, Automation, Robotics and Vision, ICARCV 2002, Singapore, 2-5 December 2002, Proceedings, pp. 1383-1391, 2002, IEEE, 981-04-8364-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
39 | Martin S. Feather, Steven L. Cornford, Timothy W. Larson |
Combining the Best Attributes of Qualitative and Quantitative Risk Management Tool Support. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASE ![In: The Fifteenth IEEE International Conference on Automated Software Engineering, ASE 2000, Grenoble, France, September 11-15, 2000, pp. 309-312, 2000, IEEE Computer Society, 0-7695-0710-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
39 | Benoit Aubert, Sylvie Dussault, Michel Patry, Suzanne Rivard |
Managing the Risk of IT Outsourcing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), January 5-8, 1999, Maui, Hawaii, USA, 1999, IEEE Computer Society, 0-7695-0001-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
39 | Jennifer Diffey, Alan Hufton, Susan M. Astley, Claire Mercer, Anthony Maxwell |
Estimating Individual Cancer Risks in the UK National Breast Screening Programme: A Feasibility Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Mammography / IWDM ![In: Digital Mammography, 9th International Workshop, IWDM 2008, Tucson, AZ, USA, July 20-23, 2008, Proceedings, pp. 469-476, 2008, Springer, 978-3-540-70537-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
prediction models, risk factors, Breast density |
39 | Farzaneh Asgharpour, Debin Liu, L. Jean Camp |
Mental Models of Security Risks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers, pp. 367-377, 2007, Springer, 978-3-540-77365-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Mental model, Card sorting, risk communication |
39 | André Årnes, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer |
Using Hidden Markov Models to Evaluate the Risks of Intrusions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 9th International Symposium, RAID 2006, Hamburg, Germany, September 20-22, 2006, Proceedings, pp. 145-164, 2006, Springer, 3-540-39723-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Hidden Markov modeling, Intrusion detection, Risk assessment |
39 | Judy E. Scott |
Measuring dimensions of perceived e-business risks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. E Bus. Manag. ![In: Inf. Syst. E Bus. Manag. 2(1), pp. 31-56, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
trust, uncertainty, control, e-business, risk |
39 | Tak Wah Kwan, Hareton K. N. Leung |
A Risk Management Methodology for Project Risk Dependencies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 37(5), pp. 635-648, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Project risk management, risk dependencies, metrics, risk assessment |
39 | Basit Shahzad, Abdullah S. Al-Mudimigh |
Risk Identification, Mitigation and Avoidance Model for Handling Software Risk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICSyN ![In: Second International Conference on Computational Intelligence, Communication Systems and Networks, CICSyN 2010, Liverpool, UK, 28-30 July, 2010, pp. 191-196, 2010, IEEE Computer Society, 978-1-4244-7837-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
software risk handling, risk mitigation, Software risk management |
39 | Huanchun Yang |
A Study on the Risk Hierarchical Model and Risk Conduction Based on the Enterprise Complex Information System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFITA (3) ![In: International Forum on Information Technology and Applications, IFITA 2009, Chengdu, China, 15-17 May 2009, pp. 595-599, 2009, IEEE Computer Society, 978-0-7695-3600-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
complex information system, information system risks, risk combination, risk hierarchical model, risk conduction |
38 | L. Jean Camp |
Hardening the Network from the Friend Within. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings, pp. 249, 2009, Springer, 978-3-642-02619-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Weifeng Chen, Zhen Liu 0001, Anton Riabov |
A Soft Constraint Privacy Model based on Identifiability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (2) ![In: 31st Annual International Computer Software and Applications Conference, COMPSAC 2007, Beijing, China, July 24-27, 2007. Volume 2, pp. 675-980, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Taghi M. Khoshgoftaar, Naeem Seliya, Kehan Gao |
Assessment of a New Three-Group Software Quality Classification Technique: An Empirical Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Empir. Softw. Eng. ![In: Empir. Softw. Eng. 10(2), pp. 183-218, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
three-group classification, expected cost of misclassification, decision trees, case-based reasoning, discriminant analysis, Software quality prediction |
37 | Jimmy Risk, Michael Ludkovski |
Sequential Design and Spatial Modeling for Portfolio Tail Risk Measurement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIAM J. Financial Math. ![In: SIAM J. Financial Math. 9(4), pp. 1137-1174, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
37 | Kaijian He, Chi Xie, Kin Keung Lai |
Estimation of Value-at-Risk for Exchange Risk Via Kernel Based Nonlinear Ensembled Multi Scale Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (1) ![In: Advances in Neural Networks - ISNN 2008, 5th International Symposium on Neural Networks, ISNN 2008, Beijing, China, September 24-28, 2008, Proceedings, Part I, pp. 148-157, 2008, Springer, 978-3-540-87731-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Nonlinear ensemble, Support vector regression, Wavelet analysis, Principle component analysis, Value at risk |
37 | Sona Kilianová, Georg Ch. Pflug |
Optimal pension fund management under multi-period risk minimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. Oper. Res. ![In: Ann. Oper. Res. 166(1), pp. 261-270, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Pension plan, Large-scale linear programming, Multi-period risk measure, Average value-at-risk |
37 | Pei Wang, Pei-Luen Patrick Rau, Gavriel Salvendy |
A Survey Study of Chinese Drivers' Inconsistent Risk Perception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (17) ![In: Engineering Psychology and Cognitive Ergonomics, 8th International Conference, EPCE 2009, Held as Part of HCI International 2009, San Diego, CA, USA, July 19-24, 2009. Proceedings, pp. 471-476, 2009, Springer, 978-3-642-02727-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Chineses driver, risk perception, risk domains |
37 | Iman Karimi, Eyke Hüllermeier, Konstantin Meskouris |
A fuzzy-probabilistic earthquake risk assessment system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Comput. ![In: Soft Comput. 11(3), pp. 229-238, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Possibility-probability distribution, Earthquake risk assessment, Fuzzy-probabilistic risk, Seismic hazard, Fuzzy Probability |
37 | Richard W. Woolridge, Denise Johnson McManus, Joanne E. Hale |
Stakeholder Risk Assessment: An Outcome-Based Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Softw. ![In: IEEE Softw. 24(2), pp. 36-45, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
OBSRAM, Outcome-Based Stakeholder Risk Assessment Model, risk management |
37 | Hsinyi Jiang, Carl K. Chang, Jinchun Xia, Shuxing Cheng |
A History-Based Automatic Scheduling Model for Personnel Risk Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (2) ![In: 31st Annual International Computer Software and Applications Conference, COMPSAC 2007, Beijing, China, July 24-27, 2007. Volume 2, pp. 361-366, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
personnel risk, history data, genetic algorithm, project management, risk factor, item response theory |
37 | Kerstin Voß, Karim Djemame, Iain Gourlay, James Padgett |
AssessGrid, Economic Issues Underlying Risk Awareness in Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECON ![In: Grid Economics and Business Models, 4th International Workshop, GECON 2007, Rennes, France, August 28, 2007, Proceedings, pp. 170-175, 2007, Springer, 978-3-540-74428-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
AssessGrid, SLA, Risk Management, Risk Assessment |
37 | Rüdiger Schultz, Stephan Tiedemann |
Conditional Value-at-Risk in Stochastic Programs with Mixed-Integer Recourse. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Math. Program. ![In: Math. Program. 105(2-3), pp. 365-386, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Mean-risk models, Mixed-integer optimization, Stochastic programming, Conditional value-at-risk |
37 | Sorin Alexe, Eugene Blackstone, Peter L. Hammer, Hemant Ishwaran, Michael S. Lauer, Claire E. Pothier Snader |
Coronary Risk Prediction by Logical Analysis of Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. Oper. Res. ![In: Ann. Oper. Res. 119(1-4), pp. 15-42, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Logical Analysis of Data, partially defined Boolean functions, risk indices, risk prediction, data mining, classification |
37 | Des Greer, David W. Bustard |
Towards an Evolutionary Software Delivery Strategy based on Soft Systems and Risk Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECBS ![In: IEEE Symposium and Workshop on Engineering of Computer Based Systems (ECBS'96), March 11-15, 1996, Friedrichshafen, Germany., pp. 126-133, 1996, IEEE Computer Society, 0-8186-7355-9. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
risk analysis evolutionary delivery, risk management, soft systems methodology |
36 | Shi-Cho Cha 0001, Pei-Wen Juo, Li-Ting Liu, Wei-Ning Chen |
RiskPatrol: A risk management system considering the integration risk management with business continuity processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings, pp. 110-115, 2008, IEEE, 978-1-4244-2414-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Shusaku Tsumoto, Yuko Tsumoto, Kimiko Matsuoka, Shigeki Yokoyama |
Risk Mining in Medicine: Application of Data Mining to Medical Risk Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WImBI ![In: Web Intelligence Meets Brain Informatics, First WICI International Workshop, WImBI 2006, Beijing, China, December 15-16, 2006, Revised Selected and Invited Papers, pp. 471-493, 2006, Springer, 978-3-540-77027-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
36 | U. S. Bhatt, David E. Newman, Benjamin A. Carreras, Ian Dobson |
Understanding the Effect of Risk Aversion on Risk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Mukund Sundararajan, Qiqi Yan |
Robust mechanisms for risk-averse sellers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC ![In: Proceedings 11th ACM Conference on Electronic Commerce (EC-2010), Cambridge, Massachusetts, USA, June 7-11, 2010, pp. 139-148, 2010, ACM, 978-1-60558-822-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
utility, revenue maximization, risk-aversion, optimal auctions |
36 | Marijn Janssen, Bram Klievink |
ICT-project failure in public administration: the need to include risk management in enterprise architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: Proceedings of the 11th Annual International Conference on Digital Government Research, Public Administration Online: Challenges and Opportunities, DG.O 2010, Puebla, Mexico, May 17-20, 2010, pp. 147-152, 2010, Digital Government Research Center, 978-1-4503-0070-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
Prince2, project failure, service-oriented architecture, e-government, project management, risk management, enterprise architecture, information architecture |
36 | Chong Wang, Wenkuan Chen, Peiji Shao |
E-business Enterprise Credit Risk Evaluation Based on Markov Chain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 569-572, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Credit risk evaluation, E-business enterprise, Markov chain |
36 | Peide Liu, Zhengwei Du |
Application of E-commerce Risk Assessment Research with Weight Unknown TOPSIS Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIP ![In: International Symposium on Information Processing, ISIP 2008 / International Pacific Workshop on Web Mining, and Web-Based Application, WMWA 2008, Moscow, Russia, 23-25 May 2008, pp. 345-349, 2008, IEEE Computer Society, 978-0-7695-3151-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
E-commerce, Risk Assessment, TOPSIS |
36 | Mohamed R. Fouad, Guy Lebanon, Elisa Bertino |
ARUBA: A Risk-Utility-Based Algorithm for Data Disclosure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings, pp. 32-49, 2008, Springer, 978-3-540-85258-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Data Utility, Security, Privacy, Anonymity, Risk Management, Data Sharing |
36 | Matthias Templ, Bernhard Meindl |
Robust Statistics Meets SDC: New Disclosure Risk Measures for Continuous Microdata Masking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Statistical Databases ![In: Privacy in Statistical Databases, UNESCO Chair in Data Privacy International Conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008. Proceedings, pp. 177-189, 2008, Springer, 978-3-540-87470-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Distance based disclosure risk, Outlier, Statistical disclosure control, Simulation study |
36 | David Saunders, Costas Xiouros, Stavros A. Zenios |
Credit risk optimization using factor models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. Oper. Res. ![In: Ann. Oper. Res. 152(1), pp. 49-77, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Large portfolio approximation, Portfolio optimization, Credit risk |
36 | Kentaro Kotani, Chiho Tateda, Ken Horii |
Computer Task-Based Evaluation Technique for Measuring Everyday Risk-Taking Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (11) ![In: Usability and Internationalization. Global and Local User Interfaces, Second International Conference on Usability and Internationalization, UI-HCII 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, Part II, pp. 417-421, 2007, Springer, 978-3-540-73288-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Risk-taking behavior, Fitts task, Steering task, Decision making |
36 | Alessandro Antonucci 0001, Alberto Piatti, Marco Zaffalon |
Credal Networks for Operational Risk Measurement and Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (2) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007. Proceedings, Part II, pp. 604-611, 2007, Springer, 978-3-540-74826-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Credal networks, Operational Risk, Imprecise probabilities |
36 | Lauren J. Thomas, Daniel J. A. Rhind, Katie J. Robinson |
Rail passenger perceptions of risk and safety and priorities for improvement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cogn. Technol. Work. ![In: Cogn. Technol. Work. 8(1), pp. 67-75, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Rail passenger, Safety preferences, Risk perception |
36 | S. Murè, Micaela Demichela, Norberto Piccinini |
Assessment of the risk of occupational accidents using a "fuzzy" approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cogn. Technol. Work. ![In: Cogn. Technol. Work. 8(2), pp. 103-112, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Occupational accident, Fuzzy logic, Risk assessment |
36 | Shanshan Song, Kai Hwang 0001, Yu-Kwong Kwok |
Risk-Resilient Heuristics and Genetic Algorithms for Security-Assured Grid Job Scheduling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 55(6), pp. 703-719, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
job scheduling heuristics, replication scheduling, risk resilience, NAS and PSA benchmarks, genetic algorithm, Grid computing, performance metrics, distributed supercomputing |
36 | Yan-Ling Wang, De-Li Yang |
Investment Selection and Risk Management for Insurance Corporation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAL ![In: Intelligent Data Engineering and Automated Learning - IDEAL 2006, 7th International Conference, Burgos, Spain, September 20-23, 2006, Proceedings, pp. 1289-1295, 2006, Springer, 3-540-45485-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Investment selection, Insurance Corporation, Risk Management |
36 | Zaid Dwaikat, Francesco Parisi-Presicce |
Risky trust: risk-based analysis of software systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 30(4), pp. 1-7, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
trust, risk analysis, distrust |
36 | Michael Doumpos |
A Stacked generalization framework for credit risk assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Oper. Res. ![In: Oper. Res. 2(2), pp. 261-278, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
classification, Stacked generalization, credit risk assessment |
36 | Bernd G. Freimut, Susanne Hartkopf, Peter Kaiser, Jyrki Kontio, Werner Kobitzsch |
An industrial case study of implementing software risk management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESEC / SIGSOFT FSE ![In: Proceedings of the 8th European Software Engineering Conference held jointly with 9th ACM SIGSOFT International Symposium on Foundations of Software Engineering 2001, Vienna, Austria, September 10-14, 2001, pp. 277-287, 2001, ACM, 978-1-58113-390-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Riskit method, case study, risk management, lessons learned |
36 | Osamu Mizuno, Takuya Adachi, Tohru Kikuno, Yasunari Takagi |
On Prediction of Cost and Duration for Risky Software Projects Based on Risk Questionnaire. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APAQS ![In: 2nd Asia-Pacific Conference on Quality Software (APAQS 2001), 10-11 December 2001, Hong Kong, China, Proceedings, pp. 120-130, 2001, IEEE Computer Society, 0-7695-1287-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Cost and duration, Regression analysis, Questionnaire, Software risk management |
36 | Kapil Agrawal |
Building Efficient Frontier by CVaR minimization for Non-normal Asset Returns Using Copula Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE ![In: Proceedings of the 11th IEEE International Conference on Computational Science and Engineering, CSE 2008, São Paulo, SP, Brazil, July 16-18, 2008, pp. 319-326, 2008, IEEE Computer Society, 978-0-7695-3193-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Multivariate distribution, Multi-objective Evolutionary Algorithm, Portfolio Optimization, NSGA-II, Copula, Value-at-Risk, Conditional Value-at-Risk, Extreme Value Theory, conditional expectation |
35 | Siv Hilde Houmb, Virginia N. L. Franqueira |
Estimating ToE Risk Level Using CVSS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 718-725, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Hiroyuki Sato |
N+/-epsilon: Reflecting Local Risk Assessment in LoA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences (2) ![In: On the Move to Meaningful Internet Systems: OTM 2009, Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part II, pp. 833-847, 2009, Springer, 978-3-642-05150-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Wanqing Li 0002, Yong Zhao, Wenqing Meng, Shipeng Xu |
Study on the Risk Prediction of Real Estate Investment Whole Process Based on Support Vector Machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, WKDD 2009, Moscow, Russia, 23-25 January 2009, pp. 167-170, 2009, IEEE Computer Society, 978-0-7695-3543-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Fariborz Farahmand, Melissa Dark, Sydney Liles, Brandon Sorge |
Risk Perceptions of Information Security: A Measurement Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (3) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 462-469, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Isaac J. Gabriel, Easwar A. Nyshadham |
A Cognitive Map of People's Online Risk Perceptions and Attitudes: An Empirical Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), Proceedings, 7-10 January 2008, Waikoloa, Big Island, HI, USA, pp. 274, 2008, IEEE Computer Society, 0-7695-3075-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Takashi Washio, Shusaku Tsumoto |
International Workshop on Risk Informatics (RI2007). ![Search on Bibsonomy](Pics/bibsonomy.png) |
JSAI ![In: New Frontiers in Artificial Intelligence, JSAI 2007 Conference and Workshops, Miyazaki, Japan, June 18-22, 2007, Revised Selected Papers, pp. 245-246, 2007, Springer, 978-3-540-78196-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Jung-Ho Eom, Seon-Ho Park, Young-Ju Han, Tai-Myoung Chung |
Risk Assessment Method Based on Business Process-Oriented Asset Evaluation for Information System Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (3) ![In: Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27 - 30, 2007, Proceedings, Part III, pp. 1024-1031, 2007, Springer, 978-3-540-72587-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Georg Ch. Pflug |
Subdifferential representations of risk measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Math. Program. ![In: Math. Program. 108(2-3), pp. 339-354, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 91B82, 90C46, 91B28 |
35 | Patrick Cheridito, Freddy Delbaen, Michael Kupper |
Coherent and convex monetary risk measures for unbounded càdlàg processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Finance Stochastics ![In: Finance Stochastics 10(3), pp. 427-448, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
JEL Classification D81, C60, G18 |
35 | Shi An, Jian Sun 0004, Yan Wang |
Dynamic Risk Measures for Discrete-time Process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE ICCI ![In: Proceedings of the Firth IEEE International Conference on Cognitive Informatics, ICCI 2006, July 17-19, Beijing, China, pp. 815-819, 2006, IEEE Computer Society, 1-4244-0475-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Shusaku Tsumoto, Takashi Washio |
Risk Mining - Overview. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JSAI ![In: New Frontiers in Artificial Intelligence, JSAI 2006 Conference and Workshops, Tokyo, Japan, June 5-9 2006, Revised Selected Papers, pp. 303-304, 2006, Springer, 3-540-69901-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Akinori Abe, Hiromi Itoh Ozaku, Noriaki Kuwahara, Kiyoshi Kogure |
Relation Between Abductive and Inductive Types of Nursing Risk Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JSAI ![In: New Frontiers in Artificial Intelligence, JSAI 2006 Conference and Workshops, Tokyo, Japan, June 5-9 2006, Revised Selected Papers, pp. 387-400, 2006, Springer, 3-540-69901-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Akinori Abe, Hiromi Itoh Ozaku, Noriaki Kuwahara, Kiyoshi Kogure |
What Should Be Abducible for Abductive Nursing Risk Management? ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (3) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 10th International Conference, KES 2006, Bournemouth, UK, October 9-11, 2006, Proceedings, Part III, pp. 22-29, 2006, Springer, 3-540-46542-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Jian Li, Laiwan Chan |
Reward Adjustment Reinforcement Learning for Risk-averse Asset Allocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCNN ![In: Proceedings of the International Joint Conference on Neural Networks, IJCNN 2006, part of the IEEE World Congress on Computational Intelligence, WCCI 2006, Vancouver, BC, Canada, 16-21 July 2006, pp. 534-541, 2006, IEEE, 0-7803-9490-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Paul Embrechts |
How to Model Operational Risk If You Must. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OR ![In: Operations Research, Proceedings 2006, Selected Papers of the Annual International Conference of the German Operations ResearchSociety (GOR), Jointly Organized with the Austrian Society of Operations Research (ÖGOR) and the Swiss Society of Operations Research (SVOR), Karlsruhe, Germany, September 6-8, 2006, pp. 81, 2006, 978-3-540-69994-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Ping Wang 0007, Kuo-Ming Chao, Chun-Lung Huang, Chi-Chun Lo, Chia-Ling Hu |
A Fuzzy Decision Model of Risk Assessment Through Fuzzy Preference Relations with Users Confidence-interval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (2) ![In: 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 18-20 April 2006, Vienna, Austria, pp. 889-893, 2006, IEEE Computer Society, 0-7695-2466-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Azadeh Davoodi, Ankur Srivastava 0001 |
Voltage scheduling under unpredictabilities: a risk management paradigm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Design Autom. Electr. Syst. ![In: ACM Trans. Design Autom. Electr. Syst. 10(2), pp. 354-368, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
design closure, voltage scheduling, low power, Predictability |
35 | Ida Hogganvik, Ketil Stølen |
Risk analysis terminology for IT-systems: does it match intuition? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISESE ![In: 2005 International Symposium on Empirical Software Engineering (ISESE 2005), 17-18 November 2005, Noosa Heads, Australia, pp. 13-22, 2005, IEEE Computer Society, 0-7803-9507-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Ram Dantu, Prakash Kolan |
Risk Management Using Behavior Based Bayesian Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings, pp. 115-126, 2005, Springer, 3-540-25999-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Kênia Pereira Batista Webster, Káthia Marçal de Oliveira, Nicolas Anquetil |
A Risk Taxonomy Proposal for Software Maintenance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSM ![In: 21st IEEE International Conference on Software Maintenance (ICSM 2005), 25-30 September 2005, Budapest, Hungary, pp. 453-461, 2005, IEEE Computer Society, 0-7695-2368-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Geoffrey G. Roy |
A Risk Management Framework for Software Engineering Practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Australian Software Engineering Conference ![In: 15th Australian Software Engineering Conference (ASWEC 2004), 13-16 April 2004, Melbourne, Australia, pp. 60-69, 2004, IEEE Computer Society, 0-7695-2089-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
35 | Tom DeMarco, Tim Lister |
Risk Management during Requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Softw. ![In: IEEE Softw. 20(5), pp. 99-101, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
35 | Brian L. Dos Santos |
Information Technology Investments: Characteristics, Choices, Market Risk and Value. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 5(3), pp. 289-301, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
35 | Victor Mikhailovich Nedel'ko |
Estimating a Quality of Decision Function by Empirical Risk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MLDM ![In: Machine Learning and Data Mining in Pattern Recognition, Third International Conference, MLDM 2003, Leipzig, Germany, July 5-7, 2003, Proceedings, pp. 182-187, 2003, Springer, 3-540-40504-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
35 | Jeong-Joon Lee, Kyu-Young Whang, Byung Suk Lee 0001, Ji-Woong Chang |
An Update-Risk Based Approach to TTL Estimation in Web Caching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISE ![In: 3rd International Conference on Web Information Systems Engineering, WISE 2002, Singapore, December 12-14, 2002, Proceedings, pp. 21-29, 2002, IEEE Computer Society, 0-7695-1766-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
35 | Jan Øyvind Aagedal, Folker den Braber, Theodosis Dimitrakos, Bjørn Axel Gran, Dimitris Raptis, Ketil Stølen |
Model-Based Risk Assessment to Improve Enterprise Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDOC ![In: 6th International Enterprise Distributed Object Computing Conference (EDOC 2002), 17-20 September 2002, Lausanne, Switzerland, Proceedings, pp. 51-, 2002, IEEE Computer Society, 0-7695-1742-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
35 | Benoit Aubert, Michel Patry, Suzanne Rivard |
Assessing the Risk of IT Outsourcing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS (6) ![In: Thirty-First Annual Hawaii International Conference on System Sciences, Kohala Coast, Hawaii, USA, January 6-9, 1998, pp. 685-, 1998, IEEE Computer Society, 0-8186-8255-8. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
35 | Shih-Wei Chou, Mong-Young He, Pi-Yi Chen |
The Factors that Affect the Implementation Success of IS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), Proceedings, 7-10 January 2008, Waikoloa, Big Island, HI, USA, pp. 421, 2008, IEEE Computer Society, 0-7695-3075-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
goal conflict, software development success, project management, risk management, coordination strategy |
35 | Ayad Ali Keshlaf, Khairuddin Hashim |
A Model and Prototype Tool to Manage Software Risks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APAQS ![In: 1st Asia-Pacific Conference on Quality Software (APAQS 2000), 30-31 October 2000, Hong Kong, China, Proceedings, pp. 297-305, 2000, IEEE Computer Society, 0-7695-0825-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Software Process Models and Software Engineering Tools, Software Risk Management |
34 | Jürgen Großmann, Michael Felderer, Fredrik Seehusen (eds.) |
Risk Assessment and Risk-Driven Quality Assurance - 4th International Workshop, RISK 2016, Held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
RISK ![, 978-3-319-57857-6 The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
34 | Laurens Lemaire, Jan Vossaert, Bart De Decker, Vincent Naessens |
An Assessment of Security Analysis Tools for Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RISK ![In: Risk Assessment and Risk-Driven Quality Assurance - 4th International Workshop, RISK 2016, Held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016, Revised Selected Papers, pp. 66-81, 2016, 978-3-319-57857-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
34 | Martin A. Schneider, Marc-Florian Wendland, Leon Bornemann |
Gaining Certainty About Uncertainty - Testing Cyber-Physical Systems in the Presence of Uncertainties at the Application Level. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RISK ![In: Risk Assessment and Risk-Driven Quality Assurance - 4th International Workshop, RISK 2016, Held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016, Revised Selected Papers, pp. 129-142, 2016, 978-3-319-57857-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
34 | Steve Muller, Carlo Harpes, Cédric Muller |
Fast and Optimal Countermeasure Selection for Attack Defence Trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RISK ![In: Risk Assessment and Risk-Driven Quality Assurance - 4th International Workshop, RISK 2016, Held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016, Revised Selected Papers, pp. 53-65, 2016, 978-3-319-57857-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
34 | Benjamin Aziz, Ali Malik, Jeyong Jung |
Check Your Blind Spot: A New Cyber-Security Metric for Measuring Incident Response Readiness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RISK ![In: Risk Assessment and Risk-Driven Quality Assurance - 4th International Workshop, RISK 2016, Held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016, Revised Selected Papers, pp. 19-33, 2016, 978-3-319-57857-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
34 | Fredrik Seehusen, Michael Felderer, Jürgen Großmann, Marc-Florian Wendland (eds.) |
Risk Assessment and Risk-Driven Testing - Third International Workshop, RISK 2015, Berlin, Germany, June 15, 2015. Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
RISK ![Springer, 978-3-319-26415-8 The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
34 | Martin A. Schneider, Steffen Herbold, Marc-Florian Wendland, Jens Grabowski |
Improving Security Testing with Usage-Based Fuzz Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RISK ![In: Risk Assessment and Risk-Driven Testing - Third International Workshop, RISK 2015, Berlin, Germany, June 15, 2015. Revised Selected Papers, pp. 110-119, 2015, Springer, 978-3-319-26415-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
34 | Alexander Mildner, Armin Janß, Jasmin Dell'Anna-Pudlik, Paul Merz, Martin Leucker, Klaus Radermacher 0001 |
Development of Device-and Service-Profiles for a Safe and Secure Interconnection of Medical Devices in the Integrated Open OR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RISK ![In: Risk Assessment and Risk-Driven Testing - Third International Workshop, RISK 2015, Berlin, Germany, June 15, 2015. Revised Selected Papers, pp. 65-74, 2015, Springer, 978-3-319-26415-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
34 | Thomas Bauer, Jürgen Großmann, Fredrik Seehusen, Ketil Stølen, Marc-Florian Wendland (eds.) |
Risk Assessment and Risk-Driven Testing - First International Workshop, RISK 2013, Held in Conjunction with ICTSS 2013, Istanbul, Turkey, November 12, 2013. Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
RISK@ICTSS ![Springer, 978-3-319-07075-9 The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 37659 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|