text of Telecommunications Regulation (Tool demo).
In Proceedings of the 7th International Conference on
Security of Information and Networks - SIN ’14, pages
85–88, New York, New York, USA. ACM Press.
Montoya, L. (2013). The trespass project.
Mounzer, J., Alpcan, T., and Bambos, N. (2010). Inte-
grated security risk management for IT-intensive or-
ganizations. In 2010 6th International Conference on
Information Assurance and Security, IAS 2010, pages
329–334. IEEE.
Nostro, N., Ceccarelli, A., Bondavalli, A., and Brancati, F.
(2014). Insider Threat Assessment. ACM SIGOPS
Operating Systems Review, 48(2):3–12.
O’Donnell, E. (2005). Enterprise risk management: A
systems-thinking framework for the event identifica-
tion phase. International Journal of Accounting Infor-
mation Systems, 6(3):177–195.
Pieters, W., Had
ˇ
ziosmanovi
´
c, D., Lenin, A., Mon-
toya Morales, A., and Willemson, J. (2014). Trespass:
Plug-and-play attacker profiles for security risk anal-
ysis (poster).
Prasad, N. R. (2007). Threat model framework and method-
ology for Personal Networks (PNs). In Proceedings
of the 2007 2nd International Conference on Commu-
nication System Software and Middleware and Work-
shops, COMSWARE 2007, pages 1–6. IEEE.
Rippon, W. (2006). Threat assessment of IP based voice
systems. In 1st IEEE Workshop on VoIP Management
and Security, 2006., pages 17–26. IEEE.
Rohde, M., Peko, G., and Sundaram, D. (2016). Mindful
Routines in the Face of Fraud. AMCIS 2016 Proceed-
ings.
Rossebø, J. E. Y., Cadzow, S., and Sijben, P. (2007).
ETVRA, a threat, vulnerability and risk assessment
method and tool for eEurope. In Proceedings - Sec-
ond International Conference on Availability, Relia-
bility and Security, ARES 2007, pages 925–933. IEEE.
Sadiq, M., Rahmani, M., Ahmad, M., and Jung, S. J. S.
(2010). Software risk assessment and evaluation pro-
cess (SRAEP) using model based approach. In Net-
working and Information Technology (ICNIT), 2010
International Conference on, pages 171–177. IEEE.
Seify, M. and Bijani, S. (2009). A Methodology for Mobile
Network Security Risk Management. In 2009 Sixth
International Conference on Information Technology:
New Generations, pages 1572–1573. IEEE.
Sherif, M., Hoeflin, D., and Recchia, M. (2003). Risk
management for new service introduction in telecom-
munications networks. In Proceedings of the Eighth
IEEE Symposium on Computers and Communica-
tions. ISCC 2003, pages 597–601. IEEE Comput. Soc.
Stoneburner, G., Goguen, A. Y., and Feringa, A. (2002).
SP 800-30. Risk Management Guide for Information
Technology Systems.
Subudhi, S. and Panigrahi, S. (2015). Quarter-Sphere Sup-
port Vector Machine for Fraud Detection in Mobile
Telecommunication Networks. Procedia Computer
Science, 48:353–359.
Sutton, S. G., Hampton, C., Khazanchi, D., and Anrold, V.
(2008). Risk Analysis in Extended Enterprise Envi-
ronments : Identification of Critical Risk Factors in
B2B E- Commerce Relationships.
Tsai, H.-Y. and Huang, Y.-L. (2011). An Analytic Hi-
erarchy Process-Based Risk Assessment Method for
Wireless Networks. IEEE Transactions on Reliabil-
ity, 60(4):801–816.
Tseng, V. S., Ying, J.-C., Huang, C.-W., Kao, Y., and Chen,
K.-T. (2015). FrauDetector. In Proceedings of the 21th
ACM SIGKDD International Conference on Knowl-
edge Discovery and Data Mining - KDD ’15, pages
2157–2166, New York, New York, USA. ACM Press.
Vahl, M., Boehmer, S., and Oestreich, T. (2009). Probabil-
ity Based Risk Analysis for a VoIP System. In 2009
Fifth Advanced International Conference on Telecom-
munications, pages 441–446. IEEE.
Vidalenc, B. and Ciavaglia, L. (2010). Proactive fault man-
agement based on risk-augmented routing. In IEEE
Globecom Workshops, GC’10, pages 481–485. IEEE.
Vinnakota, T. (2011). Systemic assessment of risks for
projects: A systems and Cybernetics approach. In
2011 IEEE International Conference on Quality and
Reliability, ICQR 2011, pages 376–380. IEEE.
Vollbrecht, J. R., Calhoun, P. R., Farrell, S., Gommans, L.,
Gross, G. M., Bruijn, B. D., Laat, C. T. D., Holdrege,
M., and Spence, D. W. (2000). AAA Authorization
Framework Status. pages 1–35.
von Brocke, J., Simons, A., Niehaves, B., Riemer, K., Plat-
tfaut, R., Cleven, A., Brocke, J. V., and Reimer, K.
(2009). Reconstructing the Giant: On the Importance
of Rigour in Documenting the Literature Search Pro-
cess.
Wickboldt, J. A., Bianchin, L. A., Lunardi, R. C., Granville,
L. Z., Gaspary, L. P., and Bartolini, C. (2011). A
framework for risk assessment based on analysis of
historical information of workflow execution in IT
systems. Computer Networks, 55(13):2954–2975.
Wu, B. and Wang, A. (2011). A multi-layer tree model for
enterprise vulnerability management. In Proceedings
of the 2011 conference on Information technology ed-
ucation - SIGITE ’11, page 257, New York, New York,
USA. ACM Press.
Yu, Z. and Wu, Y. (2010). Risk assessment of customer in-
formation in telecommunication industry. In Proceed-
ings - 2010 International Conference of Information
Science and Management Engineering, ISME 2010,
volume 2, pages 341–344. IEEE.
Zalewski, J., Drager, S., McKeever, W., and Kornecki, A. J.
(2013). Threat modeling for security assessment in
cyberphysical systems. In Proceedings of the Eighth
Annual Cyber Security and Information Intelligence
Research Workshop on - CSIIRW ’13, page 1, New
York, New York, USA. ACM Press.
ICISSP 2017 - 3rd International Conference on Information Systems Security and Privacy
396