Attack tree based information security risk assessment method integrating enterprise objectives with vulnerabilities
By: Karabey, Bugra; Baykal, Nazife. The International Arab Journal of Information Technology. Vol. 10, no. 3 (May. 2013), 8 p.
Subjects: Computers; Data processing; Data protection; Security measures