Scoring matrix framework for threat factor profiling model
One of the important requirements in preparing for an information security risk management system is to construct a threat profiling model that can be used to identify and classify threats. The threat profiling model provides an organization with a complete set of information including pattern of th...
| Main Authors: | Daud, Maslina, Ahmad, Sabariah, Abdullah, Syafiqa Anneisa, Zainuddin, Naqliyah, Sidi, Fatimah, A. Jabar, Marzanah, Affendey, Lilly Suriani, Mohd Sharef, Nurfadhlina, Ishak, Iskandar, Zolkepli, Maslina, Nordin, Fatin Nur Majdina, Md Noor, Nur Zahirah, Yusof, Norazlin, Amat Sejani, Hashimah, Hairani, Saiful Ramadzan, Sabron, Azizi |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Science Publishing Corporation
2018
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/73833/ http://psasir.upm.edu.my/id/eprint/73833/1/Scoring%20matrix%20framework%20for%20threat%20factor%20profiling%20model.pdf |
Similar Items
Towards an enhancement of organizational information security through Threat Factor Profiling (TFP) model
by: Sidi, Fatimah, et al.
Published: (2017)
by: Sidi, Fatimah, et al.
Published: (2017)
A comparative analysis study on information security threat models: a propose for threat factor profiling
by: Sidi, Fatimah, et al.
Published: (2017)
by: Sidi, Fatimah, et al.
Published: (2017)
Data-driven rice yield predictions and prescriptive analytics for sustainable agriculture in Malaysia
by: Marong, Muhammad, et al.
Published: (2024)
by: Marong, Muhammad, et al.
Published: (2024)
Development of decision support system to enhance the decision of rice pesticide management in paddy cultivation
by: Hairani, Saiful Ramadzan, et al.
Published: (2015)
by: Hairani, Saiful Ramadzan, et al.
Published: (2015)
Enhancing truth discovery in document context finding using NER – based veracity evaluator framework
by: Azman, Siti Nuradilah, et al.
Published: (2015)
by: Azman, Siti Nuradilah, et al.
Published: (2015)
The impact of data quality dimensions on business process improvement
by: Panahy, Payam Hassany Shariat, et al.
Published: (2014)
by: Panahy, Payam Hassany Shariat, et al.
Published: (2014)
Enhanced bibliographic data retrieval and visualization using query optimization and spectral centrality measure
by: Ramasamy, Chitra, et al.
Published: (2019)
by: Ramasamy, Chitra, et al.
Published: (2019)
Heatmap visualization approach for descriptive analytics of Covid-19 cases in Malaysia
by: Zolkepli, Maslina, et al.
Published: (2024)
by: Zolkepli, Maslina, et al.
Published: (2024)
Bibliographic data retrieval using query optimization techniques in Mongodb
by: Ramasamy, Chitra, et al.
Published: (2020)
by: Ramasamy, Chitra, et al.
Published: (2020)
Visualizing pandemics with calendar heatmaps : a case study of COVID-19 in Malaysia
by: Zolkepli, Maslina, et al.
Published: (2024)
by: Zolkepli, Maslina, et al.
Published: (2024)
Systematic review of data quality research
by: Jaya, M. Izham, et al.
Published: (2019)
by: Jaya, M. Izham, et al.
Published: (2019)
Temporal trends analysis for dengue outbreak and network threats severity prediction accuracy improvement
by: Mohd Sharef, Nurfadhlina, et al.
Published: (2019)
by: Mohd Sharef, Nurfadhlina, et al.
Published: (2019)
Big data analytics implementation for value discovery: a systematic literature review
by: Adrian, Cecilia, et al.
Published: (2016)
by: Adrian, Cecilia, et al.
Published: (2016)
Data quality comparative model for data warehouse.
by: Sidi, Fatimah, et al.
Published: (2012)
by: Sidi, Fatimah, et al.
Published: (2012)
A review of data quality research in achieving high data quality within organization
by: Mohd Jaya, Mohd Izham, et al.
Published: (2017)
by: Mohd Jaya, Mohd Izham, et al.
Published: (2017)
Evaluation of missing values imputation methods towards the effectiveness of asset valuation prediction model
by: Mohd Jaya, Mohd Izham, et al.
Published: (2019)
by: Mohd Jaya, Mohd Izham, et al.
Published: (2019)
Towards improving data quality using ontology application approach
by: Mohd Jaya, Mohd Izham, et al.
Published: (2015)
by: Mohd Jaya, Mohd Izham, et al.
Published: (2015)
Multiobjective deep reinforcement learning for recommendation systems
by: Ee, Yeo Keat, et al.
Published: (2022)
by: Ee, Yeo Keat, et al.
Published: (2022)
Multi-objective deep reinforcement learning for recommendation systems
by: Keat, Ee Yeo, et al.
Published: (2022)
by: Keat, Ee Yeo, et al.
Published: (2022)
Versioning approach for data warehouse schema
by: Mat Yusof, Sharmila, et al.
Published: (2019)
by: Mat Yusof, Sharmila, et al.
Published: (2019)
Fuzzy AHP and TOPSIS in cross domain collaboration Recommendation with fuzzy visualization representation
by: Zolkepli, Maslina, et al.
Published: (2020)
by: Zolkepli, Maslina, et al.
Published: (2020)
Metacognitive strategies in teaching and learning computer programming
by: Mohd Rum, Siti Nurulain, et al.
Published: (2019)
by: Mohd Rum, Siti Nurulain, et al.
Published: (2019)
Discovering dependencies among data quality dimensions : a validation of instrument.
by: Panahy, Payam Hassany Shariat, et al.
Published: (2013)
by: Panahy, Payam Hassany Shariat, et al.
Published: (2013)
A methodology to explore rules and methods for data quality dimensions toward improvement the quality of database
by: Panahy, Payam Hassany Shariat, et al.
Published: (2013)
by: Panahy, Payam Hassany Shariat, et al.
Published: (2013)
A framework to construct data quality dimensions relationships
by: Panahy, Payam Hassany Shariat, et al.
Published: (2013)
by: Panahy, Payam Hassany Shariat, et al.
Published: (2013)
Data quality : a survey of data quality dimensions.
by: Sidi, Fatimah, et al.
Published: (2012)
by: Sidi, Fatimah, et al.
Published: (2012)
Data quality: a survey of data quality dimensions
by: Sidi, Fatimah, et al.
Published: (2012)
by: Sidi, Fatimah, et al.
Published: (2012)
Replacing missing values using trustworthy data values from web data sources
by: Izham Jaya, M., et al.
Published: (2017)
by: Izham Jaya, M., et al.
Published: (2017)
Threats to auditor independence
by: Abu Bakar, Nur Barizah
Published: (2006)
by: Abu Bakar, Nur Barizah
Published: (2006)
Replacing missing values using trustworthy data values from web data sources
by: Mohd Jaya, Mohd Izham, et al.
Published: (2017)
by: Mohd Jaya, Mohd Izham, et al.
Published: (2017)
Prediction of course grades in computer science higher education program via a combination of loss functions in lstm model
by: Ghazvini, Anahita, et al.
Published: (2024)
by: Ghazvini, Anahita, et al.
Published: (2024)
Deep learning-based recommendation system: systematic review and classification
by: Li, Caiwen, et al.
Published: (2023)
by: Li, Caiwen, et al.
Published: (2023)
Data quality dimension in data warehouse
by: Sidi, Fatimah, et al.
Published: (2011)
by: Sidi, Fatimah, et al.
Published: (2011)
Data visualization for agricultural data: benefits and challenges
by: Sidi, Fatimah, et al.
Published: (2017)
by: Sidi, Fatimah, et al.
Published: (2017)
Content-based image retrieval using transfer learning and vector database
by: Shuo, Li, et al.
Published: (2022)
by: Shuo, Li, et al.
Published: (2022)
Challenges in supervised and unsupervised learning: a comprehensive overview
by: Almuqati, Mohammed Tuays, et al.
Published: (2024)
by: Almuqati, Mohammed Tuays, et al.
Published: (2024)
An efficient traffic state estimation model based on fuzzy C-mean clustering and MDL using FCD
by: Ahanin, Fatemeh, et al.
Published: (2020)
by: Ahanin, Fatemeh, et al.
Published: (2020)
Household threat
by: Lee, Kian Seng
Published: (2023)
by: Lee, Kian Seng
Published: (2023)
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
by: Mohd Sharef, Nurfadhlina
Published: (2006)
by: Mohd Sharef, Nurfadhlina
Published: (2006)
Location recognition with fuzzy grammar
by: Mohd Sharef, Nurfadhlina
Published: (2012)
by: Mohd Sharef, Nurfadhlina
Published: (2012)
Similar Items
-
Towards an enhancement of organizational information security through Threat Factor Profiling (TFP) model
by: Sidi, Fatimah, et al.
Published: (2017) -
A comparative analysis study on information security threat models: a propose for threat factor profiling
by: Sidi, Fatimah, et al.
Published: (2017) -
Data-driven rice yield predictions and prescriptive analytics for sustainable agriculture in Malaysia
by: Marong, Muhammad, et al.
Published: (2024) -
Development of decision support system to enhance the decision of rice pesticide management in paddy cultivation
by: Hairani, Saiful Ramadzan, et al.
Published: (2015) -
Enhancing truth discovery in document context finding using NER – based veracity evaluator framework
by: Azman, Siti Nuradilah, et al.
Published: (2015)