Cybersecurity Risk Assessment: An Asset-Based Approach to Pre-Attack Threat Analysis
Hyunmin Lee, Kyungho Lee, Journal of Internet Computing and Services, Vol. 26, No. 3, pp. 19-33, Jun. 2025
Keywords: Attack trees, cybersecurity, data privacy, information security, Risk Analysis
Abstract
Statistics
Show / Hide Statistics
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
|
Cite this article
[APA Style]
Lee, H. & Lee, K. (2025). Cybersecurity Risk Assessment: An Asset-Based Approach to Pre-Attack Threat Analysis. Journal of Internet Computing and Services, 26(3), 19-33. DOI: 10.7472/jksii.2025.26.3.19.
[IEEE Style]
H. Lee and K. Lee, "Cybersecurity Risk Assessment: An Asset-Based Approach to Pre-Attack Threat Analysis," Journal of Internet Computing and Services, vol. 26, no. 3, pp. 19-33, 2025. DOI: 10.7472/jksii.2025.26.3.19.
[ACM Style]
Hyunmin Lee and Kyungho Lee. 2025. Cybersecurity Risk Assessment: An Asset-Based Approach to Pre-Attack Threat Analysis. Journal of Internet Computing and Services, 26, 3, (2025), 19-33. DOI: 10.7472/jksii.2025.26.3.19.

