REFERENCES
[1] CSI/FBI (2007, 12, 03). The 12th Annual Computer Crime and Security Survey.
[2] OWASP: the open web application security project, “the ten most critical web application security risks. 2013
[3] M. Cherghi H. Medroumi and A. Souti, “ Inter –organizational workflow for Intelligent Audit of Information Technologiesin terms of Entreprise Business Processes” International Journal of Advanced Computer Science and Aplication, 5(5), 2014
[4] R. Latif, H. Abbas, S. Assar, Q. Ali, Cloud computing risk assessment: a systematic literature review, in: Future Information Technology, Springer,Berlin, Heidelberg, 2014, pp. 285–295.
[5] A. Mukhopadhyay, S. Chatterjee, D. Saha, A. Mahanti & S.K. Sadhukhan. (2006, 01, 07). e-Risk Management with Insurance : A framework using Copula aided Bayesian Belief Networks, Proceedings of the 39th Hawaii International Conference on System Sciences.
[6] F. Foroughi, « Information Security Risk Assessment by Using Bayesian Learning Technique”, Proceedings of the World Congress on Engineering 2008 Vol I WCE 2008, July 2 - 4, 2008, London, U.K.
[7] E. Loukis, D. Spinellis, “Information Systems Security in the Greek Public Sector”. Information Management and Computer Security 9(1), pp. 21–31, 2001.
[8] M. Myerson, “Risk Management Processes for Software Engineering Models”. Boston: Artech House, 1997.
[9] D. Spinellis, S. Kokolakis, S. Gritzalis, “Security requirements, risks and recommendations for small enterprise and home office environments”. Information Management & Computer Security 7(3), pp. 121-128, 1999.
[10] T. Tsiakis, “Information Security Expenditures: a Techno-Economic Analysis”, IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.4, April 2010
[11] W. Böhmer, “Evaluation of the Quality of an Information Security Management System (ISMS) or how secure is secure?”. Guest lecture at the Gjovik University College, 2006.
[12] B. Berger. (2003, 08, 20). Data-Centric Quantitative Computer Security Risk Assessment, [Online]. Available: http://www.sans.org/reading_room/whitepapers/auditin g/1209.php.
[13] L.B.A. Rabai , M. Jouini, A. Ben Aissa, A. Mili, « A cybersecurity model in cloud computing environments”, Journal of King Saud University – Computer and Information Sciences (2013) 25, 63–75
[14] A. Ben Aissa, R.K. Abercrombie, F.T. Sheldon, A. Mili, “Quantifying security threats and their potential impacts: a case study”. Innovation in Systems and Software Engineering: A NASA Journal 6, 269–281.2010 Amal Benfateh et al.
[15] X. Zhang, N. Wuwong, H. Li, “Information security risk management framework for the cloud computing environments”. In: 10th International Conference on Computer and Information Technology (CIT), pp. 1328–1334. 2010
[16] U. Akyazi and A.S.E. Uyar. Distributed intrusion detection using mobile agents against ddos attacks. In Computer and Information Sciences, 2008. ISCIS ’08. 23rd International Symposium on, pages 1-6, Oct 2008.
[17] Venkateshwaran K and Anu Malviya and Utkarsha Dikshit and S.Venkatesan. “Security Framework for Agent-Based Cloud Computing”. International Journal of Interactive Multimedia and Artificial Intelligence. Volume 3, number 3, 2015
[18] O. Demir, B. Khan, G. Ben Brahim, and A. Al-Fuqaha. Optimizing agent placement for flow reconstruction of ddos attacks. In Wireless Communications and Mobile ComputingC onference (IWCMC), 2013 9th International, pages 83-89, July 2013.
[19] M. Zamani, M. Movahedi, M. Ebadzadeh, and H. Pedram. A ddos-awareids model based on dangertheory and mobile agents. In Computational Intelligence and Security, 2009. CIS ’09. International Conference on, volume 1, pages 516-520, Dec 2009.
[20] M. Duraipandian and C. Palanisamy. An intelligent agent based defense architecture for ddos attacks. In Electronics and Communication Systems (ICECS), 2014 International Conference, pages 1-7, Feb 2014
[21] J. Canavan, “The Fundamentals of Network Security”. Boston: Artech House, 2001.
|