-
5
-
-
0028576333
-
On measurement of operational security
-
Gaithersburg, IEEE Computer Society
-
S. Brocklehurst, B. Littlewood, T. Olovsson and E. Jonsson, "On Measurement of Operational Security". Proc. 9th Annual IEEE Conference on Computer Assurance, Gaithersburg, pp. 257-66, IEEE Computer Society, 1994.
-
(1994)
Proc. 9th Annual IEEE Conference on Computer Assurance
, pp. 257-266
-
-
Brocklehurst, S.1
Littlewood, B.2
Olovsson, T.3
Jonsson, E.4
-
6
-
-
84974774507
-
Towards operational measures of computer security
-
B. Littlewood, S. Brocklehurst, N. Fenton, P. Mellor, S. Page, D. Wright; "Towards Operational Measures of Computer Security", Journal of Computer Security, V. 2 (2/3), pp 211-230, 1993.
-
(1993)
Journal of Computer Security
, vol.2
, Issue.2-3
, pp. 211-230
-
-
Littlewood, B.1
Brocklehurst, S.2
Fenton, N.3
Mellor, P.4
Page, S.5
Wright, D.6
-
7
-
-
2542607810
-
Quantitative assessment of operational security: Models and tools
-
LAAS Report 96493, May
-
M. Dacier, Y. Deswarte and M. Kaâniche, Quantitative Assessment of Operational Security: Models and Tools, Technical Report, LAAS Report 96493, May 1996.
-
(1996)
Technical Report
-
-
Dacier, M.1
Deswarte, Y.2
Kaâniche, M.3
-
9
-
-
0034501876
-
Windows of vulnerability: A case study analysis
-
December
-
W. A. Arbaugh, W. L. Fithen, J. McHugh, "Windows of Vulnerability: A Case Study Analysis", IEEE Computer, Vol. 33, No. 12, pp. 52-59, December 2000.
-
(2000)
IEEE Computer
, vol.33
, Issue.12
, pp. 52-59
-
-
Arbaugh, W.A.1
Fithen, W.L.2
McHugh, J.3
-
10
-
-
0034823003
-
A trend analysis of exploitation
-
May 2001
-
H. K. Browne, W. A. Arbaugh, J. McHugh, W.L. Fithen, "A Trend Analysis of Exploitation", Proc. IEEE Symposium on Security and Privacy, 2001, May 2001, pp. 214-229.
-
(2001)
Proc. IEEE Symposium on Security and Privacy
, pp. 214-229
-
-
Browne, H.K.1
Arbaugh, W.A.2
McHugh, J.3
Fithen, W.L.4
-
11
-
-
27744506995
-
Developing a probabilistic security measure using a software reliability model
-
October
-
C.Y. Shim, R.E. Gantenbein, and S.Y. Shin, "Developing a Probabilistic Security Measure Using a Software Reliability Model", Information, October 2001, pp. 409-418.
-
(2001)
Information
, pp. 409-418
-
-
Shim, C.Y.1
Gantenbein, R.E.2
Shin, S.Y.3
-
12
-
-
27744476858
-
Vulnerabilities in major operating systems
-
Computer Science Department, Colorado State University
-
O. H. Alhazmi, Y. K. Malaiya, I. Ray, Vulnerabilities in Major Operating Systems, Technical Report, Computer Science Department, Colorado State University, 2004.
-
(2004)
Technical Report
-
-
Alhazmi, O.H.1
Malaiya, Y.K.2
Ray, I.3
-
13
-
-
27744583699
-
-
September 12
-
ICAT Metabase, http://icat.nist.gov/icat.cfm, September 12, 2004.
-
(2004)
ICAT Metabase
-
-
-
14
-
-
27744470261
-
Software reliability models: Theoretical development, evaluation and applications
-
Y. K. Malaiya, P. K. Srimani, "Software Reliability Models: Theoretical Development, Evaluation and Applications", IEEE Computer Society Press, 1990.
-
(1990)
IEEE Computer Society Press
-
-
Malaiya, Y.K.1
Srimani, P.K.2
-
15
-
-
2342581753
-
From the ground up: The DIMACS software security workshop
-
March/April
-
G. McGraw. "From the Ground Up: The DIMACS Software Security Workshop", IEEE Security & Privacy. March/April 2003. Volume 1, Number 2. pp. 59-66.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.2
, pp. 59-66
-
-
McGraw, G.1
|