Semi-Automated Threat Vulnerability & Risk Assessment (TVRA) for Medical Devices
Abstract
References
Recommendations
Taxonomy of information security risk assessment (ISRA)
Information is a perennially significant business asset in all organizations. Therefore, it must be protected as any other valuable asset. This is the objective of information security, and an information security program provides this kind of ...
Information Security Risk Assessment Methodology Research: Group Decision Making and Analytic Hierarchy Process
WCSE '10: Proceedings of the 2010 Second World Congress on Software Engineering - Volume 01Information security risk can be measured by probability of the potential risk incident and its impact. Various quantitative methodologies are given to compute information security risks, but among the existed research, seldom of them considered the ...
Cyber-Risk Management within IoMT: a Context-aware Agent-based Framework for a Reliable e-Health System
iiWAS2021: The 23rd International Conference on Information Integration and Web IntelligenceThe Internet of Medical Things (IoMT) is creating all sorts of new applications and capabilities for healthcare services and transforming medical care in lasting and impactful ways. Jointly, new security and cyber-security risks are arisen. ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Demonstration
- Research
- Refereed limited
Funding Sources
- European Union's Horizon Europe Research and Innovation Programme
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 55Total Downloads
- Downloads (Last 12 months)55
- Downloads (Last 6 weeks)15
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format