Tables index

From

Creating a Comprehensive Assessment of Cyber Risks

Cheryl Ann Alexander, Lidong Wang

American Journal of Software Engineering. 2024, 7(1), 1-7 doi:10.12691/ajse-7-1-1
  • Table 1. A set of threats for a risk analysis
  • Table 2. Risks of blockchain implementation and their ranking
  • Table 3. Threat analysis and risk assessment regarding sensors and data acquisition
  • Table 4. A cybersecurity framework for an MCPS
  • Table 5. System-level vulnerabilities and losses
  • Table 6. IoT risk assessment categories of NIST
  • Table 7. Types of risks regarding IoT/IoMT
  • Table 8. Measures taken by a hospital to enhance cybersecurity
  • Table 9. Cyber risks and their measurement values in the Medical Center