1 |
Patterson, F. D., & Neailey, K., "A Risk Register Database System to aid the management of project risk," International Journal of Project Management, 20(5), pp. 365-374, 2002.
DOI
ScienceOn
|
2 |
Talabis, M., & Martin, J., "Chapter 2 - Information Security Risk Assessment: A Practical Approach, In Information Security Risk Assessment Toolkit," Boston: Syngress, pp. 27-62, 2013.
|
3 |
Tsiakis, T., "Information Security Expenditures: a Techno-Economic Analysis," International Journal of Computer Science and Network Security (IJCSNS), 10(4), pp. 7-11, 2010.
|
4 |
Vorster, A., & Labuschagne, L., "A framework for comparing different information security risk analysis methodologies," In Proc. of Paper presented at the Proceedings of the 2005 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries, White River, South Africa, 2005.
|
5 |
McGill, William L., Bilal M. Ayyub, and Mark Kaminskiy, "Risk analysis for critical asset protection," Risk Analysis, 27 no. 5, pp. 1265-1281, 2007.
|
6 |
Christopher Alberts, Audrey Dorofee, James Stevens, and Carol Woody. "Introduction to the OCTAVE Approach," Pittsburgh, PA, Carnegie Mellon University, 2003.
|
7 |
Choudhari, J., & Suman, U., "Story Points Based Effort Estimation Model for Software Maintenance," Procedia Technology 4, pp761-765, 2012.
DOI
ScienceOn
|
8 |
Yazar, Zeki. "A qualitative risk analysis and management tool-CRAMM," SANS InfoSec Reading Room White Paper, 2002.
|
9 |
Davor Macek, I. M., Nikola Ivkovic, Information Security Risk Assessment in Financial Institutions Using VECTOR Matrix and OCTAVE Methods. 2011.
|
10 |
Moorthy, Jayaletchumi T. Sambantha, Suhaimi Ibrahim, and Mohd Naz'ri Mahrin, "The Need For Usability Risk Assessment Model," In Proc. of The Second International Conference on Informatics Engineering & Information Science (ICIEIS2013), The Society of Digital Information and Wireless Communication, pp. 215-220, 2013.
|
11 |
Moorthy, Jayaletchumi Sambantha, Suhaimi bin Ibrahim, and Mohd Naz'ri Mahrin, "Developing Usable Software Product Using Usability Risk Assessment Model," International Journal of Digital Information and Wireless Communications (IJDIWC) 4, no. 1, pp. 95-102, 2014.
|
12 |
Er, M. C., Problems and solutions in software maintenance. Data Processing, 26(6), 25-27. 1984.
|
13 |
Bisbal, Jesus, Deirdre Lawless, B. Wu, J. Grimson, V. Wade, R. Richardson, and D. O'Sullivan. "A survey of research into legacy system migration," Technique report, 1997.
|
14 |
Martin Butler, B. W., Reducing Costs and Improving Agility Through Legacy Migration, 2010.
|
15 |
Jalote, Pankaj, "Software Requirements Analysis and Specification," In An Integrated Approach to Software Engineering, Springer New York, pp. 73-158, 1997.
|
16 |
Ketil Stolen, F. d. B., Theo Dimitrakos, Rune Fredriksen, Model-based risk assessment - the CORAS approach.
|
17 |
Mahmoodian, N., Abdullah, R., & Murad, M. A. A., "Text-based classification incoming maintenance requests to maintenance type," In Proc. of 2010 International Symposium in Paper presented at the Information Technology (ITSim), 15-17 June, 2010.
|
18 |
Muhammad Inayat Ullah, M. S., Nazir Muhammad, Reduction of enhanced maintenance effort using ARM model and RMMM plan, 2010.
|
19 |
Wiegers, Karl, "Know your enemy: software risk management," Software Development-San Francisco- 6, pp. 38-44, 1998.
|
20 |
Erdil, Kagan, Emily Finn, Kevin Keating, Jay Meattle, Sunyoung Park, and Deborah Yoon, "Software maintenance as part of the software life cycle," Comp180: Software Engineering Project, 2003.
|
21 |
Behnia, Armaghan, Rafhana Abd Rashid, and Junaid Ahsenali Chaudhry, "A survey of information security risk analysis methods," Smart Computing Review 2, no. 1, pp. 279-94, 2012.
|
22 |
C. Alberts, Audree Dorofee, James Stevens, Carol Woody, Introduction to the OCTAVE Approach, Pittsburgh, PA: 15213-3890, Carnegie Mellon, Sotfware Engineering Institute, August, 2003.
|
23 |
Wu, Bing, Deirdre Lawless, Jesus Bisbal, Jane Grimson, Vincent Wade, Donie O'Sullivan, and Ray Richardson, "Legacy systems migration-a method and its tool-kit framework," In Proc. of Software Engineering Conference, Asia Pacific and International Computer Science Conference 1997. APSEC'97 and ICSC'97. Proceedings, pp. 312-320. IEEE, 1997.
|
24 |
Breier, J., & Hudec, L., "Risk analysis supported by information security metrics," In Proc. of Paper presented at the Proceedings of the 12th International Conference on Computer Systems and Technologies, Vienna, Austria, 2011.
|
25 |
Marek, P., and J. Paulina. "The OCTAVE methodology as a risk analysis tool for business resources," In Proc. of International Multiconference Computer Science and IT, Hong Kong. 2006.
|