Open Access
MATEC Web Conf.
Volume 76, 2016
20th International Conference on Circuits, Systems, Communications and Computers (CSCC 2016)
Article Number 04011
Number of page(s) 9
Section Computers
Published online 21 October 2016
  1. T. Aven, Risk assessment and risk management: Review of recent advances on their foundation, European Journal of Operational Research, 253: 1–13 (2016) [CrossRef] [Google Scholar]
  2. J. Aagedal, D. Braber, T. Dimitrakos, B. Gran, D. Raptis, K. Stolen, Model-based risk assessment to improve enterprise security. In: Proceedings of the sixth international enterprise distributed object computing conference. EDOC’02. 51–62, (2002) [CrossRef] [Google Scholar]
  3. F. Baiardi, C. Telmon, D. Sgandurra, Hierarchical, model-based risk management of critical infrastructures, Reliability Engineering and System Safety, 94, 1403–1415 (2009) [CrossRef] [Google Scholar]
  4. A. Białas, Bezpieczeństwo informacji i usług w nowoczesnej instytucji i firmie, (WNT, 2007) [Google Scholar]
  5. I. Eusgeld, C. Nan, S. Dietz., “System-of-systemsapproach for interdependent critical infrastructures, Reliability Engineering and System Safety, 96, 679–686 (2011) [CrossRef] [Google Scholar]
  6. K. Jajuga, Zarządzanie ryzykiem, (PWN, 2009) [Google Scholar]
  7. A. Korczowski., Zarządzanie ryzykiem w projektach informatycznych. Teoria i praktyka, (Helion, 2013) [Google Scholar]
  8. P. Matkowski, Zarządzanie ryzykiem operacyjnym, (Wolters Kluwer Polska, 2006) [Google Scholar]
  9. J. Monkiewicz, L. Gąsiorkiewicz, Zarządzanie ryzykiem działalności organizacji, (Uczelnie Techniczne, 2010) [Google Scholar]
  10. O. Patrick, ISO 31000:2009 Risk managementPrinciples and guidelines (2009) [Google Scholar]
  11. J. Stanik, M. Kiedrowicz, Selected aspects of risk management in respect of security of the document lifecycle management system with multiple levels of sensitivity, Information Management in Practice, 18, 231–251 (2015) [Google Scholar]
  12. PN ISO/IEC 27001 Information security management systems. Requirements [Google Scholar]
  13. PN ISO/IEC 27005 Information technology. Security techniques. Information security risk management [Google Scholar]
  14. PN-ISO 31000 Zarządzanie ryzykiemZasady i wytyczne [Google Scholar]
  15. PKN–ISO GUIDE 73 Risk management - Terminology [Google Scholar]
  16. Probabilistic Risk Assessment Procedures Guide for NASA Managers and Practitioners, NASA/SP-2011-3421, Sec.Ed. (2011) [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.