작업처리율을 고려한 정보보호 투자 포트폴리오 평가
Vol. 20, No. 2, pp. 109-116,
4월.
2010
10.13089/JKIISC.2010.20.2.109, Full Text:
Keywords: Information Security Breach, Security Threat, Investment Portfolio, throughput, Economic Analysis, Probability Model
Abstract Statistics
Cite this article
10.13089/JKIISC.2010.20.2.109, Full Text:
Keywords: Information Security Breach, Security Threat, Investment Portfolio, throughput, Economic Analysis, Probability Model
Abstract Statistics
Cite this article
[IEEE Style]
W. Yang, T. Kim, H. Park, "Considering System Throughput to Evaluate Information Security Investment Portfolios," Journal of The Korea Institute of Information Security and Cryptology, vol. 20, no. 2, pp. 109-116, 2010. DOI: 10.13089/JKIISC.2010.20.2.109.
[ACM Style]
Won-Seok Yang, Tae-Sung Kim, and Hyun-Min Park. 2010. Considering System Throughput to Evaluate Information Security Investment Portfolios. Journal of The Korea Institute of Information Security and Cryptology, 20, 2, (2010), 109-116. DOI: 10.13089/JKIISC.2010.20.2.109.