Search Results

There are 4653 results for: content related to: A taxonomy framework based on ITU-TX-805 security architecture for quantitative determination of computer network vulnerabilities

  1. Indicators of expert judgement and their significance: an empirical investigation in the area of cyber security

    Expert Systems

    Volume 31, Issue 4, September 2014, Pages: 299–318, Hannes Holm, Teodor Sommestad, Mathias Ekstedt and Nicholas Honeth

    Version of Record online : 24 JUN 2013, DOI: 10.1111/exsy.12039

  2. A test of intrusion alert filtering based on network information

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2291–2301, Teodor Sommestad and Ulrik Franke

    Version of Record online : 9 JAN 2015, DOI: 10.1002/sec.1173

  3. A concept analysis of women's vulnerability during pregnancy, birth and the postnatal period

    Journal of Advanced Nursing

    Volume 72, Issue 10, October 2016, Pages: 2330–2345, Lesley Briscoe, Tina Lavender and Linda McGowan

    Version of Record online : 3 JUN 2016, DOI: 10.1111/jan.13017

  4. Cyber-Security

    Standard Article

    Wiley Handbook of Science and Technology for Homeland Security

    Michel Cukier and Susmit Panjwani

    Published Online : 15 MAR 2009, DOI: 10.1002/9780470087923.hhs040

  5. Integrated drought causality, hazard, and vulnerability assessment for future socioeconomic scenarios: An information theory perspective

    Journal of Geophysical Research: Atmospheres

    Volume 120, Issue 13, 16 July 2015, Pages: 6346–6378, Deepthi Rajsekhar, Vijay P. Singh and Ashok K. Mishra

    Version of Record online : 14 JUL 2015, DOI: 10.1002/2014JD022670

  6. Vulnerability of the South African farming sector to climate change and variability: An indicator approach

    Natural Resources Forum

    Volume 34, Issue 3, August 2010, Pages: 175–187, Glwadys A. Gbetibouo, Claudia Ringler and Rashid Hassan

    Version of Record online : 4 AUG 2010, DOI: 10.1111/j.1477-8947.2010.01302.x

  7. Managing Enterprise Risks of Technological Systems: An Exploratory Empirical Analysis of Vulnerability Characteristics as Drivers of Exploit Publication

    Decision Sciences

    Volume 47, Issue 6, December 2016, Pages: 1073–1102, Ravi Sen and Gregory R. Heim

    Version of Record online : 8 JAN 2016, DOI: 10.1111/deci.12212

  8. RNA sequencing of transformed lymphoblastoid cells from siblings discordant for autism spectrum disorders reveals transcriptomic and functional alterations: Evidence for sex-specific effects

    Autism Research

    Daniel S. Tylee, Alfred J. Espinoza, Jonathan L. Hess, Muhammad A. Tahir, Sarah Y. McCoy, Joshua K. Rim, Totadri Dhimal, Ori S. Cohen and Stephen J. Glatt

    Version of Record online : 16 AUG 2016, DOI: 10.1002/aur.1679

  9. Characteristics of START Assessments Completed in Mental Health Jail Diversion Programs

    Behavioral Sciences & the Law

    Volume 30, Issue 4, July/August 2012, Pages: 448–469, Sarah L. Desmarais, Richard A. Van Dorn, Robin P. Telford, John Petrila and Tim Coffey

    Version of Record online : 16 JUL 2012, DOI: 10.1002/bsl.2022

  10. You have free access to this content
    Governance Mechanisms and Equity Prices

    The Journal of Finance

    Volume 60, Issue 6, December 2005, Pages: 2859–2894, K. J. MARTIJN CREMERS and VINAY B. NAIR

    Version of Record online : 10 NOV 2005, DOI: 10.1111/j.1540-6261.2005.00819.x

  11. Household Life Cycle Protection: Life Insurance Holdings, Financial Vulnerability, and Portfolio Implications

    Journal of Risk and Insurance

    Volume 74, Issue 1, March 2007, Pages: 141–173, Yijia Lin and Martin F. Grace

    Version of Record online : 8 MAR 2007, DOI: 10.1111/j.1539-6975.2007.00205.x

  12. Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM)

    Security and Communication Networks

    Volume 6, Issue 9, September 2013, Pages: 1087–1116, Nor Badrul Anuar, Maria Papadaki, Steven Furnell and Nathan Clarke

    Version of Record online : 10 DEC 2012, DOI: 10.1002/sec.673

  13. Drawing the line between adaptation and development: a systematic literature review of planned adaptation in developing countries

    Wiley Interdisciplinary Reviews: Climate Change

    Volume 7, Issue 5, September/October 2016, Pages: 707–726, Mya Sherman, Lea Berrang-Ford, Shuaib Lwasa, James Ford, Didacus B. Namanya, Alejandro Llanos-Cuentas, Michelle Maillet, Sherilee Harper and IHACC Research Team

    Version of Record online : 14 JUL 2016, DOI: 10.1002/wcc.416

  14. Service delivery models of cloud computing: security issues and open challenges

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4726–4750, Salman Iqbal, Miss Laiha Mat Kiah, Nor Badrul Anuar, Babak Daghighi, Ainuddin Wahid Abdul Wahab and Suleman Khan

    Version of Record online : 30 AUG 2016, DOI: 10.1002/sec.1585

  15. Welfare Dynamics Measurement: Two Definitions of a Vulnerability Line and Their Empirical Application

    Review of Income and Wealth

    Hai-Anh H. Dang and Peter F. Lanjouw

    Version of Record online : 25 JUL 2016, DOI: 10.1111/roiw.12237

  16. You have free access to this content
    Food Safety, Food Fraud, and Food Defense: A Fast Evolving Literature

    Journal of Food Science

    Volume 81, Issue 4, April 2016, Pages: R823–R834, Louise Manning and Jan Mei Soon

    Version of Record online : 2 MAR 2016, DOI: 10.1111/1750-3841.13256

  17. You have free access to this content
    Incorporating sociocultural adaptive capacity in conservation hotspot assessments

    Diversity and Distributions

    Volume 16, Issue 3, May 2010, Pages: 439–450, Jason P. Sexton, Mark W. Schwartz and Bruce Winterhalder

    Version of Record online : 22 MAR 2010, DOI: 10.1111/j.1472-4642.2010.00656.x

  18. Trust and trustworthiness in nursing: an argument-based literature review

    Nursing Inquiry

    Volume 19, Issue 3, September 2012, Pages: 223–237, Leyla Dinç and Chris Gastmans

    Version of Record online : 3 NOV 2011, DOI: 10.1111/j.1440-1800.2011.00582.x

  19. The View From the Looking Glass: How Are Narcissistic Individuals Perceived by Others?

    Journal of Personality

    Volume 81, Issue 1, February 2013, Pages: 1–15, Mallory L. Malkin, Virgil Zeigler-Hill, Christopher T. Barry and Ashton C. Southard

    Version of Record online : 2 JAN 2013, DOI: 10.1111/j.1467-6494.2013.00780.x

  20. Fine- and coarse-filter conservation strategies in a time of climate change

    Annals of the New York Academy of Sciences

    Volume 1322, Issue 1, August 2014, Pages: 92–109, Morgan W. Tingley, Emily S. Darling and David S. Wilcove

    Version of Record online : 12 JUL 2014, DOI: 10.1111/nyas.12484