Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1]. S. Snedaker, “IT Security Project Management Handbook”. Syngress, 2006. [2]. J. Davis, “Information Security Management Handbook”, ch. Measuring ROI on Security, pp. 1056–1060. CRC Press LLC, 5th ed., 2004. [3]. R. Richardson, “2007 csi computer crime and security survey,” tech. rep., Computer Security Institute, 2007. [4]. N. Damianou, N. Dulay, E. Lupu, and M. Sloman, “The ponder policy specification language,” in Proceedings of Policy 2001: Workshop on Policies for Distributed Systems and Networks, pp. 18–39, 2001. [5]. N. Dulay, E. Lupu, M. Sloman, and N. Damianou, “A policy deployment model for the ponder language,” in Proceedings of IEEE/IFIP International Symposium on Integrated Network Management, (Seattle, USA), 2001. [6]. J. Dai and J. Alves-Foss, “Logic based authorization policy engineering,” in Proc. 6th World Multi conference on Systemics, Cybernetics, and Informatics, pp. 230– 238, July 2002. [7]. S. Jajodia, P. Samarati, and V. S. Subrahmanian, “A logical language for express-ing authorizations,” in Proceedings of IEEE Symposium on Security and Privacy, (Oakland, CA, USA), 1997. [8]. M. Hamdi, “Mathematical Aspects of Network Security Risk Analysis”. PhD thesis, SUP’COM, July 2005. [9]. N. Satoh and N. Komoda, “A labor time estimation model for the information security audit by quantitative analysis i and regression analysis,” in Proceedings of the 4th WSEAS International Conference on E-ACTIVITIES, (Miami, Florida, USA), pp. 136–141, November 17-19 2005. [10]. T. Akin, “Information Security Management Handbook”, ch. Managing the Re-sponse to a Computer Security Incident, pp. 2977–2986. CRC Press LLC, 5th ed., 2004. [11]. C. C. Center, “Csirt faq.” http://www.cert.org/csirts/csirt faq.html, April 2008. Last visited: April 2008. [12]. M. J. West-Brown, D. Stikvoort, K.-P. Kossakowski, G. Killcrece, R. Ruefle, and M. Zajicek, “Handbook for computer security incident response teams (csirts),” Handbook CMU/SEI-2003-HB-002, CMU/SEI, April 2003. 2nd Edition. [13]. C. Hare, Information Security Management Handbook, ch. CIRT: Responding to Attack. CRC Press LLC, 2004. [14]. K. M. Shaurette and T. J. Schleppenbach, Information Security Management Handbook, ch. Incident Response Exercises. CRC Press LLC, 2004. [15]. R. Campbell, “A modular approach to computer security risk management,” in [16]. Proceedings of the AFIPS Conference, 1979. [17]. R. Summers, Secure Computing. McGraw Hill, 1997. [18]. “Risk management,” in AS/NZS 4360:1999, Standards Australia and Standards New Zealand, 1999. [19]. “Iso/iec 1799:2000 (part 1), information technology-code of practice for information security management,” 2000. [20]. “Bs 7799-2:2002 (part 2), information security management systems,” 2002. [21]. G. Stonebumer, A. Grogen, and A. Fering, Risk Management Guide for Information Technology Systems. National Institute fro Standards and Technology. special publication 800-30. [22]. Government of Canada, Communications Security Establishment, A Guide to Risk Management and Safeguard Selection for IT Systems, January 1996.
![]() | V2I414.pdf |
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE : |
---|
☞ LAST DATE OF SUBMISSION : 31st March 2023 |
---|
☞ SUBMISSION TO FIRST DECISION : In 7 Days |
---|
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION |
---|