Cited By
View all- Zurko M(2005)User-Centered SecurityProceedings of the 21st Annual Computer Security Applications Conference10.1109/CSAC.2005.60(187-202)Online publication date: 5-Dec-2005
Critical refers to infrastructure that provides an essential support for economic and social well-being, for public safety and for the functioning of key government responsibilities. According to Resolution of the National Security Strategy of the ...
Risk management includes phases such as risk identification, risk assessment and risk control. Little work has focused on risk summarization, which is a useful phase of risk management. Risk summarization means a list of occurred risks, risk ...
Association for Computing Machinery
New York, NY, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in