Shing, Marn-ling; Shing, Chen-chi; Shing, Lee-pin; … - In: Advances in management & applied economics 2 (2012) 3, pp. 1-12
In order to protect enterprise networks from unauthorized access and malicious attacks, a few risk models were proposed. This paper proposes to use optimization approach for a business to make decision based on certain budget constraint within a certain years. -- risk assessment ; risk...