Author of the publication

A Study on Implementations of Information Security Risk Assessment: Application to Chlorine Processing System of Water Treatment.

, , and . Int. J. Netw. Secur., 16 (4): 241-248 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Comprehensive Overview of Government Hacking Worldwide., , , , and . IEEE Access, (2018)A Study on Information Security Management with Personal Data Protection., , and . ICPADS, page 624-630. IEEE Computer Society, (2011)Are polymer melts "ideal"., , , , , , and . Comput. Phys. Commun., 177 (1-2): 146-149 (2007)A novel approach to evaluate software vulnerability prioritization., , , and . J. Syst. Softw., 86 (11): 2822-2840 (2013)A Study on E-Taiwan Promotion Information Security Governance Programs with E-government Implementation of Information Security Management Standardization., and . Int. J. Netw. Secur., 18 (3): 565-578 (2016)Real-time artificial intelligence system for bacteremia prediction in adult febrile emergency department patients., , , , , , , , and . Int. J. Medical Informatics, (October 2023)Mobile Social Service User Identification Framework Based on Action-Characteristic Data Retention., , , , , , and . IEEE Access, (2020)A Study on Implementations of Information Security Risk Assessment: Application to Chlorine Processing System of Water Treatment., , and . Int. J. Netw. Secur., 16 (4): 241-248 (2014)Patching assignment optimization for security vulnerabilities., , , and . Int. Arab J. Inf. Technol., 13 (2): 267-273 (2016)