4.5 Article

A Markov-Based Model for Information Security Risk Assessment in Healthcare MANETs

Related references

Note: Only part of the references are listed.
Article Telecommunications

Integrated wireless communication system using MANET for remote pastoral areas of Tibet

Cao Huang et al.

China Communications (2016)

Article Computer Science, Information Systems

Returns to information security investment: Endogenizing the expected loss

Kjell Hausken

INFORMATION SYSTEMS FRONTIERS (2014)

Article Information Science & Library Science

Cloud Implications on Software Network Structure and Security Risks

Terrence August et al.

INFORMATION SYSTEMS RESEARCH (2014)

Article Computer Science, Information Systems

Exploring attack graph for cost-benefit security hardening: A probabilistic approach

Shuzhen Wang et al.

COMPUTERS & SECURITY (2013)

Article Computer Science, Artificial Intelligence

A framework for enabling patient monitoring via mobile ad hoc network

Sweta Sneha et al.

DECISION SUPPORT SYSTEMS (2013)

Article Computer Science, Artificial Intelligence

Cyber-risk decision models: To insure IT or not?

Arunabha Mukhopadhyay et al.

DECISION SUPPORT SYSTEMS (2013)

Article Computer Science, Hardware & Architecture

Evaluating opportunistic networks in disaster scenarios

Abraham Martin-Campillo et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)

Proceedings Paper Computer Science, Theory & Methods

i-HOPE Framework for Predicting Cyber Breaches: A Logit Approach

Saini Das et al.

PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (2013)

Review Computer Science, Information Systems

A Review of Cyber Threats and Defence Approaches in Emergency Management

George Loukas et al.

FUTURE INTERNET (2013)

Article Computer Science, Information Systems

Security model for emergency real-time communications in autonomous networks

Emmanouil A. Panaousis et al.

INFORMATION SYSTEMS FRONTIERS (2012)

Article Mathematics, Applied

A hybrid ranking approach to estimate vulnerability for dynamic attacks

Feng Zhao et al.

COMPUTERS & MATHEMATICS WITH APPLICATIONS (2011)

Article Computer Science, Information Systems

Information systems resources and information security

Kuo-chung Chang et al.

INFORMATION SYSTEMS FRONTIERS (2011)

Article Computer Science, Artificial Intelligence

A Projection Pursuit Based Risk Assessment Method in Mobile Ad hoc Networks

Fu Cai et al.

INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS (2011)

Article Engineering, Electrical & Electronic

Cognitive MANET Design for Mission-Critical Networks

Ossama Younis et al.

IEEE COMMUNICATIONS MAGAZINE (2009)

Article Engineering, Electrical & Electronic

The Dynamic Community of Interest and Its Realization in ZODIAC

Scott Alexander et al.

IEEE COMMUNICATIONS MAGAZINE (2009)

Article Computer Science, Information Systems

Information Security Threats: A Comparative Analysis of Impact, Probability, and Preparedness

Mary Sumner

INFORMATION SYSTEMS MANAGEMENT (2009)

Article Computer Science, Hardware & Architecture

Providing early resource allocation during emergencies: The mobile triage tag

R. Marti et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2009)

Article Computer Science, Information Systems

Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing

Prayag Narula et al.

COMPUTER COMMUNICATIONS (2008)

Article Computer Science, Information Systems

Information security management: An information security retrieval and awareness model for industry

E. Kritzinger et al.

COMPUTERS & SECURITY (2008)

Article Information Science & Library Science

An economic modelling approach to information security risk management

Rok Bojanc et al.

INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2008)

Article Computer Science, Information Systems

An examination of private intermediaries' roles in software vulnerabilities disclosure

Pu Li et al.

INFORMATION SYSTEMS FRONTIERS (2007)

Article Computer Science, Hardware & Architecture

Secure and efficient key management in mobile ad hoc networks

Bing Wu et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2007)

Article Computer Science, Information Systems

Secure position-based routing protocol for mobile ad hoc networks

Joo-Han Song et al.

AD HOC NETWORKS (2007)

Article Computer Science, Hardware & Architecture

Investigating sophisticated - Security breaches

E Casey

COMMUNICATIONS OF THE ACM (2006)

Article Management

Market for software vulnerabilities? Think again

K Kannan et al.

MANAGEMENT SCIENCE (2005)

Article Computer Science, Information Systems

Information Security governance: COBIT or ISO 17799 or both?

B von Solms

COMPUTERS & SECURITY (2005)

Article Computer Science, Information Systems

A location-based routing method for mobile ad hoc networks

L Blazevic et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2005)

Article Computer Science, Hardware & Architecture

Intrusion detection in wireless ad hoc networks

A Mishra et al.

IEEE WIRELESS COMMUNICATIONS (2004)

Article Computer Science, Hardware & Architecture

DakNet: Rethinking connectivity in developing nations

AS Pentland et al.

COMPUTER (2004)

Article Computer Science, Information Systems

A survey of mobility models for ad hoc network research

T Camp et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2002)

Article Engineering, Electrical & Electronic

Self-organization in mobile ad hoc networks:: The approach of terminodes

L Blazevic et al.

IEEE COMMUNICATIONS MAGAZINE (2001)

Article Computer Science, Hardware & Architecture

Software security and privacy risks in mobile e-commerce

AK Ghosh et al.

COMMUNICATIONS OF THE ACM (2001)

Article Computer Science, Artificial Intelligence

Cognitive fuzzy modeling for enhanced risk assessment in a health care institution

E Smith et al.

IEEE INTELLIGENT SYSTEMS & THEIR APPLICATIONS (2000)