-
5
-
-
26444448266
-
Security in opens versus closed systems - The dance of boltzmann, coase and moore
-
Toulouse, France, June 20-21
-
R. J. Anderson, "Security in Opens versus Closed Systems - The Dance of Boltzmann, Coase and Moore," Open Source Software: Economics, Law and Policy, Toulouse, France, June 20-21, 2002.
-
(2002)
Open Source Software: Economics, Law and Policy
-
-
Anderson, R.J.1
-
6
-
-
78249276668
-
Timing the application of security patches for optimal uptime
-
November
-
S. Beattie, S. Arnold, C. Cowan, P. Wagle and C. Wright, "Timing the Application of Security Patches for Optimal Uptime," Proc. LISA XVI, November 2002. pp 233-242.
-
(2002)
Proc. LISA XVI
, pp. 233-242
-
-
Beattie, S.1
Arnold, S.2
Cowan, C.3
Wagle, P.4
Wright, C.5
-
7
-
-
0030410990
-
A conservative theory for long-term reliability growth prediction
-
Dec.
-
P. G. Bishop and R. E. Bloomfield, "A Conservative Theory for Long-Term Reliability Growth Prediction," IEEE Trans. Reliability, Vol. 45, No. 4, Dec. 1996. pp
-
(1996)
IEEE Trans. Reliability
, vol.45
, Issue.4
-
-
Bishop, P.G.1
Bloomfield, R.E.2
-
8
-
-
12344266250
-
Murphy's law, the fitness of evolving species, and the limits of software reliability
-
September
-
R. M. Brady, R. J. Anderson, R. C. Ball, "Murphy's law, the fitness of evolving species, and the limits of software reliability", Cambridge University Computer Laboratory Technical Report No. 471 (September 1999), available at http://www.cl.cam.ac.uk/ftp/users/rja14/babtr.pdf.
-
(1999)
Cambridge University Computer Laboratory Technical Report No. 471
-
-
Brady, R.M.1
Anderson, R.J.2
Ball, R.C.3
-
9
-
-
0034823003
-
A trend analysis of exploitation
-
May 2001
-
H. K. Browne, W. A. Arbaugh, J. McHugh, W. L. Fithen, "A Trend Analysis of Exploitation," Proc. IEEE Symposium on Security and Privacy, 2001, May 2001, pp. 214-229.
-
(2001)
Proc. IEEE Symposium on Security and Privacy
, pp. 214-229
-
-
Browne, H.K.1
Arbaugh, W.A.2
McHugh, J.3
Fithen, W.L.4
-
10
-
-
0037244529
-
Reducing internet-based intrusions: Effective security patch management
-
Jan-Feb
-
B. Brykczynski and R. A. Small, "Reducing Internet-Based Intrusions: Effective Security Patch Management,", IEEE Software, Vol. 20, No. 1, Jan-Feb 2003, pp. 50-57
-
(2003)
IEEE Software
, vol.20
, Issue.1
, pp. 50-57
-
-
Brykczynski, B.1
Small, R.A.2
-
11
-
-
0018505572
-
Time-dependent error detection rate model for software and other performance measures
-
August
-
A. L. Goel and K. Okumoto, "Time-Dependent Error Detection Rate Model for Software and Other Performance Measures," IEEE Trans. on Reliability, R-28, 3, August 1979, pp. 206-211.
-
(1979)
IEEE Trans. on Reliability
, vol.R-28
, Issue.3
, pp. 206-211
-
-
Goel, A.L.1
Okumoto, K.2
-
12
-
-
27744583699
-
-
February
-
ICAT Metabase, http://icat.nist.gov/icat.cfm, February 2004.
-
(2004)
ICAT Metabase
-
-
-
14
-
-
0027694035
-
An examination of fault exposure ratio
-
Nov.
-
Y.K. Malaiya, A. von Mayrhauser, P.K. Srimani, "An Examination of Fault Exposure Ratio," IEEE Trans. Software Engineering, Nov. 1993, pp. 1087-1094.
-
(1993)
IEEE Trans. Software Engineering
, pp. 1087-1094
-
-
Malaiya, Y.K.1
Von Mayrhauser, A.2
Srimani, P.K.3
-
15
-
-
2342581753
-
From the ground up: The DIMACS software security workshop
-
Number 2, March/April
-
G. McGraw. "From the Ground Up: The DIMACS Software Security Workshop," IEEE Security & Privacy. Volume 1, Number 2, March/April 2003, pp. 59-66.
-
(2003)
IEEE Security & Privacy
, vol.1
, pp. 59-66
-
-
McGraw, G.1
-
16
-
-
84860018549
-
-
February
-
The MITRE Corporation, www.mitre.org, February 2005.
-
(2005)
-
-
-
18
-
-
0021208648
-
A logarithmic Poisson execution time model for software reliability measurement
-
Orlando, FL
-
J.D. Musa and K. Okumoto, "A logarithmic Poisson execution time model for software reliability measurement," Proc. 7th International Conference on Software Engineering, Orlando, FL, 1984, pp. 230-238.
-
(1984)
Proc. 7th International Conference on Software Engineering
, pp. 230-238
-
-
Musa, J.D.1
Okumoto, K.2
-
19
-
-
14744276335
-
Is finding security holes a good idea?
-
Jan-Feb
-
E. Rescola, "Is finding security holes a good idea?" Security and Privacy, Jan-Feb 2005. pp. 14-19.
-
(2005)
Security and Privacy
, pp. 14-19
-
-
Rescola, E.1
-
20
-
-
26444582561
-
-
Lawrence Livermore National Laboratory, July 23
-
E. E. Schultz, Jr., D. S. Brown and T. A. Longstaff, "Responding to Computer Security Incidents," Lawrence Livermore National Laboratory, ftp://ftp.cert.dfn.de/pub/docs/csir/ihg.ps.gz, July 23, 1990.
-
(1990)
Responding to Computer Security Incidents
-
-
Schultz Jr., E.E.1
Brown, D.S.2
Longstaff, T.A.3
|