-
1
-
-
0034501876
-
Windows of vulnerability: A case study analysis
-
W. Arbaugh, W. Fithen, and J. McHugh, "Windows of Vulnerability: A Case Study Analysis," Computer, vol. 33, no. 12, 2000, pp. 52-59.
-
(2000)
Computer
, vol.33
, Issue.12
, pp. 52-59
-
-
Arbaugh, W.1
Fithen, W.2
McHugh, J.3
-
2
-
-
0036898258
-
Risk assessment for dummies
-
S. Mash, "Risk Assessment for Dummies," Computer Fraud & Security, vol. 2002, no. 12, 2002, pp. 11-13.
-
(2002)
Computer Fraud & Security
, vol.2002
, Issue.12
, pp. 11-13
-
-
Mash, S.1
-
3
-
-
24344497787
-
Software patch management - The new frontier
-
L. McGhie, "Software Patch Management - The New Frontier," Secure Business Quarterly, vol. 3, no. 2, 2003.
-
(2003)
Secure Business Quarterly
, vol.3
, Issue.2
-
-
McGhie, L.1
-
5
-
-
0030676601
-
How to systematically classify computer security intrusions
-
IEEE CS Press
-
U. Lindqvist and E. Jonsson, "How to Systematically Classify Computer Security Intrusions," Proc. 1997 IEEE Symp. Security & Privacy, IEEE CS Press, 1997, pp. 154-163.
-
(1997)
Proc. 1997 IEEE Symp. Security & Privacy
, pp. 154-163
-
-
Lindqvist, U.1
Jonsson, E.2
-
7
-
-
24344479498
-
Risk management of information systems
-
E. Kiountouzis, ed., EPY Athens
-
S. Katsikas, "Risk Management of Information Systems," Information Security: Technical, Legal, and Social Issues, E. Kiountouzis, ed., EPY Athens, 1995.
-
(1995)
Information Security: Technical, Legal, and Social Issues
-
-
Katsikas, S.1
-
8
-
-
0038819499
-
A taxonomy for information security technologies
-
H. Venter and J. Eloff, "A Taxonomy for Information Security Technologies," Computers & Security, vol. 22, no. 4, 2003, pp. 299-307.
-
(2003)
Computers & Security
, vol.22
, Issue.4
, pp. 299-307
-
-
Venter, H.1
Eloff, J.2
-
10
-
-
0013324190
-
Risk analysis: An interpretative feasibility tool in justifying information systems security
-
R. Baskerville, "Risk Analysis: An Interpretative Feasibility Tool in Justifying Information Systems Security," European J. Information Systems, vol. 1, no. 2, 1991, pp. 121-130.
-
(1991)
European J. Information Systems
, vol.1
, Issue.2
, pp. 121-130
-
-
Baskerville, R.1
-
11
-
-
0003219646
-
The goal question metric approach
-
John Wiley & Sons
-
V.R. Basili, G. Caldiera, and D. Rombach, "The Goal Question Metric Approach," Encyclopedia of Software Engineering, vol. 2, John Wiley & Sons, 1994, pp. 528-532.
-
(1994)
Encyclopedia of Software Engineering
, vol.2
, pp. 528-532
-
-
Basili, V.R.1
Caldiera, G.2
Rombach, D.3
-
13
-
-
0036431803
-
Trends in academic research: Vulnerabilities analysis and intrusion detection
-
M. Bishop, "Trends in Academic Research: Vulnerabilities Analysis and Intrusion Detection," Computers & Security, vol. 21, no.7, 2002, pp. 609-612.
-
(2002)
Computers & Security
, vol.21
, Issue.7
, pp. 609-612
-
-
Bishop, M.1
|