Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-2 of 2
Keywords: Vulnerability analysis
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Lost in the middle – a pragmatic approach for ERP managers to prioritize known vulnerabilities by applying classification and regression trees (CART)
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2023) 31 (5): 655–674.
Published: 15 September 2023
... Enterprise systems ERP Vulnerability analysis CART Classification and regression trees National vulnerability database Cybersecurity is a concern for all organizations. Much has been written about technical solutions and how to incent end-users to adopt strong security practices (Reuter et...
Journal Articles
A review of security assessment methodologies in industrial control systems
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2019) 27 (1): 47–61.
Published: 07 February 2019
... can range from disrupting or damaging critical infrastructural operations to causing major economic losses or even more dangerously, claim human lives. Cyber attacks Vulnerability analysis Power systems SCADA systems Security assessment Vulnerability analysis © Emerald Publishing...
