-
1
-
-
27144551930
-
-
EP-27046-ACTIVE, D4.2.2, Ver. 2.0, 2001-02-22
-
EP-27046-ACTIVE, Final Prototype and User Manual, D4.2.2, Ver. 2.0, 2001-02-22., 2001.
-
(2001)
Final Prototype and User Manual
-
-
-
3
-
-
85178861675
-
-
Esprit Long Term Research Project 20072-DeVa
-
P.-J. Courtois, N. E. Fenton, B. Littlewood, M. Neil, L. Strigini, and D. R. Wright. Bayesian belief network model for the safety assessment of nuclear computer-based systems. Second year report part 2, Esprit Long Term Research Project 20072-DeVa, 1998.
-
(1998)
Bayesian Belief Network Model for the Safety Assessment of Nuclear Computer-based Systems. Second Year Report Part 2
-
-
Courtois, P.-J.1
Fenton, N.E.2
Littlewood, B.3
Neil, M.4
Strigini, L.5
Wright, D.R.6
-
4
-
-
0343677407
-
Formilizing engineering judgment on software dependability via belied netowrks
-
Garmisch-Partenkirchen, Germany
-
K. Delic, M. Mazzanti, and L. Stringini. Formilizing engineering judgment on software dependability via belied netowrks. In DCCA-6, Sixth IFIP International Working Conference on Dependable Computing for Critical Applications, "Can We Rely on Computers?", Garmisch-Partenkirchen, Germany, 1997.
-
(1997)
DCCA-6, Sixth IFIP International Working Conference on Dependable Computing for Critical Applications, "Can We Rely on Computers?"
-
-
Delic, K.1
Mazzanti, M.2
Stringini, L.3
-
5
-
-
0031996245
-
Assessing dependability of safety critical systems using diverse evidence
-
N. Fenton, B. Littlewood, M. Neil, L. Strigini, A. Sutcliffe, and D. Wright. Assessing dependability of safety critical systems using diverse evidence. IEEE Proceedings Software Engineering, 145(1), 1998.
-
(1998)
IEEE Proceedings Software Engineering
, vol.145
, Issue.1
-
-
Fenton, N.1
Littlewood, B.2
Neil, M.3
Strigini, L.4
Sutcliffe, A.5
Wright, D.6
-
9
-
-
27144497515
-
Using aspects to manage security risks in risk-driven development
-
TUM
-
S. H. Houmb, G. Georg, R. France, and D. Matheson. Using aspects to manage security risks in risk-driven development. In 3rd International Workshop on Critical Systems Development with UML, number TUM-I0415, pages 71-84. TUM, 2004.
-
(2004)
3rd International Workshop on Critical Systems Development with UML
, Issue.TUM-I0415
, pp. 71-84
-
-
Houmb, S.H.1
Georg, G.2
France, R.3
Matheson, D.4
-
10
-
-
85178853538
-
Combining disparate information sources when quantifying security risks
-
S. H. Houmb, O. A. Johnsen, and T. Stalhane. Combining Disparate Information Sources when Quantifying Security Risks. In Proceeding of SCI 2004, RMCI 2004, Orlando, July 2004, 2004.
-
(2004)
Proceeding of SCI 2004, RMCI 2004, Orlando, July 2004
-
-
Houmb, S.H.1
Johnsen, O.A.2
Stalhane, T.3
-
14
-
-
0031123773
-
A quantitative model of the security intrusion process based on attacker behavior
-
April
-
E. Jonsson and T. Olovsson. A quantitative model of the security intrusion process based on attacker behavior. IEEE Trans. Software Eng., 4(25):235, April 1997.
-
(1997)
IEEE Trans. Software Eng.
, vol.4
, Issue.25
, pp. 235
-
-
Jonsson, E.1
Olovsson, T.2
-
16
-
-
23944491305
-
Tools for critical systems development with UML
-
N. Jardin Nunes, B. Selic, A. Silva, and A. Toval, editors, UML Modeling Languages and Applications. UML 2004 Satellite Activities, Lisbon, Portugal, October 11-15, 2004, Revised Selected Papers. Springer
-
J. Jürjens and P. Shabalin. Tools for Critical Systems Development with UML. In N. Jardin Nunes, B. Selic, A. Silva, and A. Toval, editors, UML Modeling Languages and Applications. UML 2004 Satellite Activities, Lisbon, Portugal, October 11-15, 2004, Revised Selected Papers, volume 3297 of LNCS. Springer, 2004.
-
(2004)
LNCS
, vol.3297
-
-
Jürjens, J.1
Shabalin, P.2
-
17
-
-
0001006209
-
Local computations with probabilities on graphical structures and their application to expert systems
-
S. L. Lauritzen and D. J. Spiegelhalter. Local computations with probabilities on graphical structures and their application to expert systems (with discussion). Journal of the Royal Statistical Society, Series B 50(2): 157-224, 1988.
-
(1988)
Journal of the Royal Statistical Society, Series B
, vol.50
, Issue.2
, pp. 157-224
-
-
Lauritzen, S.L.1
Spiegelhalter, D.J.2
-
18
-
-
84974774507
-
Towards operational measures of computer security
-
B. Littlewood, S. Brocklehurst, N. Fenton, P. Mellor, S. Page, D. Wright, J. Dobson, McDermid J., and D. Gollmann. Towards operational measures of computer security. Journal of Computer Security, 2:211-229, 1993.
-
(1993)
Journal of Computer Security
, vol.2
, pp. 211-229
-
-
Littlewood, B.1
Brocklehurst, S.2
Fenton, N.3
Mellor, P.4
Page, S.5
Wright, D.6
Dobson, J.7
McDermid, J.8
Gollmann, D.9
-
20
-
-
84858276007
-
Handbook for performing expert judgment
-
SINTEF
-
K. Øien and P. R. Hokstad. Handbook for performing expert judgment. Technical report, SINTEF, 1998.
-
(1998)
Technical Report
-
-
Øien, K.1
Hokstad, P.R.2
-
21
-
-
0033325475
-
Experiments with quantitative evaluation tools for monitoring operational security
-
Sept/Oct
-
R. Ortalo and Y. Deswarte. Experiments with quantitative evaluation tools for monitoring operational security. IEEE Trans. Software Eng., 5(25):633-650, Sept/Oct 1999.
-
(1999)
IEEE Trans. Software Eng.
, vol.5
, Issue.25
, pp. 633-650
-
-
Ortalo, R.1
Deswarte, Y.2
-
24
-
-
84867376694
-
SERENE: Safety and risk evaluation using bayesian nets
-
SERENE: Safety and Risk Evaluation using Bayesian Nets. ESPIRIT Framework IV nr. 22187, 1999. http://www.hugin.dk/serene/.
-
(1999)
ESPIRIT Framework IV Nr. 22187
-
-
-
26
-
-
27144463943
-
Model-based risk assessment in a component-based software engineering process: The CORAS approach to identify security risks
-
F. Barbier, editor. Kluwer. ISBN: 1-4020-7207-4
-
K. Stølen, F. den Braber, T. Dimitrakos, R. Fredriksen, B. A. Gran, S. H. Houmb, Y. C. Stamatiou, and J. Ø. Aagedal. Model-based risk assessment in a component-based software engineering process: The CORAS approach to identify security risks. In F. Barbier, editor, Business Component-Based Software Engineering, pages 189-207. Kluwer, 2002. ISBN: 1-4020-7207-4.
-
(2002)
Business Component-based Software Engineering
, pp. 189-207
-
-
Stølen, K.1
Den Braber, F.2
Dimitrakos, T.3
Fredriksen, R.4
Gran, B.A.5
Houmb, S.H.6
Stamatiou, Y.C.7
Aagedal, J.Ø.8
-
27
-
-
27144505986
-
Security analysis of sitar intrusion tolerance system
-
ACM Press
-
D. Wang, B. B. Madan, and K. S. Trivedi. Security analysis of sitar intrusion tolerance system. In ACM SSRS'03. ACM Press, 2003.
-
(2003)
ACM SSRS'03
-
-
Wang, D.1
Madan, B.B.2
Trivedi, K.S.3
-
28
-
-
0009582826
-
The srp authentication and key exchange system
-
Network Working Group
-
T. Wu. The srp authentication and key exchange system, 2000. RFC 2945, Network Working Group.
-
(2000)
RFC
, vol.2945
-
-
Wu, T.1
|