Jenab, Kouroush; Khoury, Sam; LaFevor, Kim - In: International Journal of Enterprise Information Systems … 12 (2016) 1, pp. 59-84
A flow-graph depicts the interrelationships among cyber security and security threats/incidents (i.e., internal, external, and accidental). Using a flow-graph, the manner in which security threats may affect systems can be investigated. This paper reports analytical approaches to analyze time to...