-
2
-
-
0018294853
-
A modular approach to computer security risk management
-
Campbell RP. A modular approach to computer security risk management. Proceedings of the AFIPS Conference, vol. 48. 1979; 293-304.
-
(1979)
Proceedings of the AFIPS Conference
, vol.48
, pp. 293-304
-
-
Campbell, R.P.1
-
5
-
-
27144463943
-
Model-based risk assessment in a component-based software engineering process: The CORAS approach to identify security risks
-
Franck Barbier (ed.). Kluwer Academic Publishers: Dordrecht
-
Stolen K, den Braber F, Dimitrakos T, Fredriksen R, Gran BA, Houmb S-H, Stamatiou YC, Aagedal JO. Model-based risk assessment in a component-based software engineering process: the CORAS approach to identify security risks. In Business Component-Based Software Engineering. Franck Barbier (ed.). Kluwer Academic Publishers: Dordrecht, 2003; 189-207.
-
(2003)
Business Component-Based Software Engineering
, pp. 189-207
-
-
Stolen, K.1
Den Braber, F.2
Dimitrakos, T.3
Fredriksen, R.4
Gran, B.A.5
Houmb, S.-H.6
Stamatiou, Y.C.7
Aagedal, J.O.8
-
6
-
-
26644466023
-
NetRAM: A novel method for network security risk management
-
Gjovik, Norway
-
Hamdi M, Boudriga N, Kriche J, Tounsi M. NetRAM: a novel method for network security risk management. Nordic Workshop on Secure IT Systems (NordSec), Gjovik, Norway, 2003.
-
(2003)
Nordic Workshop on Secure IT Systems (NordSec)
-
-
Hamdi, M.1
Boudriga, N.2
Kriche, J.3
Tounsi, M.4
-
7
-
-
33751072193
-
Risk analysis and assessment
-
Chapter 15 (4th edn). Auerbach Publications, October ISBN: 0849398290
-
Ozier W. Risk analysis and assessment. Handbook of Information Security, Chapter 15 (4th edn). Auerbach Publications, October 1999; 247-285, ISBN: 0849398290.
-
(1999)
Handbook of Information Security
, pp. 247-285
-
-
Ozier, W.1
-
10
-
-
0034270432
-
Statically scanning Java code: Finding security vulnerabilities
-
Viega J, Mutdosch T, McGraw G. Statically scanning Java code: finding security vulnerabilities. IEEE Software 2000; 17(5):68-74.
-
(2000)
IEEE Software
, vol.17
, Issue.5
, pp. 68-74
-
-
Viega, J.1
Mutdosch, T.2
McGraw, G.3
-
11
-
-
26644438038
-
Towards analyzing security-critical software during development
-
RST Corporation, December
-
Ghosh AK, McGraw GE, Charron FH, Schatz MA. Towards analyzing security-critical software during development. Technical Report RSTR-96-023-01, RST Corporation, December 1996.
-
(1996)
Technical Report
, vol.RSTR-96-023-01
-
-
Ghosh, A.K.1
McGraw, G.E.2
Charron, F.H.3
Ma, S.4
-
14
-
-
2642540118
-
Modeling internet attacks
-
U.S.A., June
-
Tidwell T, Larson R, Fitch K, Hale J. Modeling internet attacks. Proceedings of the IEEE Workshop on Information Assurance and Security, U.S.A., June 2001.
-
(2001)
Proceedings of the IEEE Workshop on Information Assurance and Security
-
-
Tidwell, T.1
Larson, R.2
Fitch, K.3
Hale, J.4
-
16
-
-
0034593376
-
Attack net penetration testing
-
Ballycotton, Country Cork, Ireland, September
-
Me Dermott J. Attack net penetration testing. The 2000 New Security Paradigms Workshop, Ballycotton, Country Cork, Ireland, September 2000.
-
(2000)
The 2000 New Security Paradigms Workshop
-
-
Me Dermott, J.1
-
17
-
-
0036038515
-
Collaborative attack modeling
-
Madrid, Spain, ISBN:1-58113-445-2
-
Steffan J, Schumacher M. Collaborative attack modeling. Proceedings of the 2002 ACM Symposium on Applied Computing, Madrid, Spain, 2002; 253-259, ISBN:1-58113-445-2.
-
(2002)
Proceedings of the 2002 ACM Symposium on Applied Computing
, pp. 253-259
-
-
Steffan, J.1
Schumacher, M.2
-
18
-
-
84871963080
-
Representation and analysis of coordinated attacks
-
ACM CCS, Washington, DC, U.S.A., October
-
Braynov S, Jadiwala M. Representation and analysis of coordinated attacks. Workshop on Formal Methods in Security Engineering, ACM CCS, Washington, DC, U.S.A., October 2003.
-
(2003)
Workshop on Formal Methods in Security Engineering
-
-
Braynov, S.1
Jadiwala, M.2
-
20
-
-
26644454733
-
A decisional framework system for computer network intrusion detection
-
Hammamet, Tunisia
-
Fessi BA, Hamdi M, Benabdallah S, Boudriga N. A decisional framework system for computer network intrusion detection. Conference on Multi-Objective Programming and Goal Programming, Hammamet, Tunisia, 2004.
-
(2004)
Conference on Multi-objective Programming and Goal Programming
-
-
Fessi, B.A.1
Hamdi, M.2
Benabdallah, S.3
Boudriga, N.4
-
21
-
-
0036093229
-
Toward cost-sensitive modeling for intrusion detection
-
ISSN: 0926-227X
-
Lee W, Miller M, Stolfo S, Jallad K, Park C, Zadok E, Prabhakar V. Toward cost-sensitive modeling for intrusion detection. Journal of Computer Security 2002; 10(1-2):5-22, ISSN: 0926-227X.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 5-22
-
-
Lee, W.1
Miller, M.2
Stolfo, S.3
Jallad, K.4
Park, C.5
Zadok, E.6
Prabhakar, V.7
-
22
-
-
2142852379
-
Cost benefit analysis for network intrusion detection systems
-
Washington, DC, October
-
Wei H, Frinke D, Carter O, Ritter C. Cost benefit analysis for network intrusion detection systems. CSI 28th Annual Computer Security Conference, Washington, DC, October 2001.
-
(2001)
CSI 28th Annual Computer Security Conference
-
-
Wei, H.1
Frinke, D.2
Carter, O.3
Ritter, C.4
-
25
-
-
84902485551
-
An abstract reduction model for computer security risk
-
WCC-SEC, Toulouse, France
-
Hamdi M, Boudriga N. An abstract reduction model for computer security risk. IFIP World Computer Congress, WCC-SEC, Toulouse, France, 2004.
-
(2004)
IFIP World Computer Congress
-
-
Hamdi, M.1
Boudriga, N.2
|