Skip to main navigation
Skip to search
Skip to main content
New Jersey Institute of Technology Home
Help & FAQ
Home
Profiles
Research units
Facilities
Federal Grants
Research output
Press/Media
Search by expertise, name or affiliation
Managing complex IT security processes with value based measures
Robert K. Abercrombie
, Frederick T. Sheldon
,
Ali Mili
Office of the Dean - YWCC
Computer Science
Research output
:
Chapter in Book/Report/Conference proceeding
›
Conference contribution
16
Scopus citations
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Managing complex IT security processes with value based measures'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Value-based Measures
100%
IT Security
100%
Security Process
100%
Complex Structure
33%
Vulnerability
33%
Popular
33%
Adaptation
33%
Effective Method
33%
Cyber
33%
System Specification
33%
High Stakes
33%
Security Domain
33%
Aggregate Structure
33%
Risk Management Practices
33%
Stakeholder Interests
33%
Cyberspace Security
33%
Econometric System
33%
Security Measures
33%
Course of Action
33%
Traditional Risk
33%
Dependability Attributes
33%
Consistent Method
33%
Architectural Context
33%
Comprehensive Measure
33%
Mitigation Investment
33%
Balanced Approach
33%
Computer Science
Cybersecurity
100%
System Specification
100%
Criticality
100%
Risk Management
100%
Security Domain
100%
Effective Method
100%
Security Measure
100%
Security Process
100%