-
1
-
-
27744556127
-
-
Alhazmi OH, Malaiya YK. Quantitative vulnerability assessment of systems software. In: Proceedings of 51st annual reliability and maintainability symposium, Alexandria, VA; January 2005. p. 615-20.
-
-
-
-
2
-
-
33750962700
-
-
Alhazmi OH, Malaiya YK. Modeling the vulnerability discovery process. In: International Symposium on Software Reliability Engineering; November 2005.
-
-
-
-
3
-
-
26444516466
-
-
Alhazmi OH, Malaiya YK, Ray I. Security vulnerabilities in software systems: a quantitative perspective. In: Proceedings of IFIP WG 11.3 working conference on data and applications security; August 2005. p. 281-94.
-
-
-
-
4
-
-
0347104960
-
Assessing computer security vulnerability
-
Alves-Foss J., and Barbosa S. Assessing computer security vulnerability. Operating Systems Review 29 3 (1995) 3-13
-
(1995)
Operating Systems Review
, vol.29
, Issue.3
, pp. 3-13
-
-
Alves-Foss, J.1
Barbosa, S.2
-
5
-
-
34248375122
-
-
Anderson Ross. Security in open versus closed systems-the dance of Boltzmann, Coase and Moore. In: Conference on open source software: economics, law and policy, Toulouse, France; June 2002. p. 1-15, http://www.ftp.cl.cam.ac.uk/ftp/users/rja14/toulouse.pdf.
-
-
-
-
6
-
-
0034501876
-
Windows of vulnerability: a case study analysis
-
Arbaugh W.A., Fithen W.L., and McHugh J. Windows of vulnerability: a case study analysis. IEEE Computer 33 12 (December 2000) 52-59
-
(2000)
IEEE Computer
, vol.33
, Issue.12
, pp. 52-59
-
-
Arbaugh, W.A.1
Fithen, W.L.2
McHugh, J.3
-
7
-
-
0028576333
-
On measurement of operational security
-
IEEE Computer Society, Gaithersburg
-
Brocklehurst S., Littlewood B., Olovsson T., and Jonsson E. On measurement of operational security. Proceedings of the 9th annual IEEE conference on computer assurance (1994), IEEE Computer Society, Gaithersburg 257-266
-
(1994)
Proceedings of the 9th annual IEEE conference on computer assurance
, pp. 257-266
-
-
Brocklehurst, S.1
Littlewood, B.2
Olovsson, T.3
Jonsson, E.4
-
8
-
-
0034823003
-
-
Browne HK, Arbaugh WA, McHugh J, Fithen WL. A trend analysis of exploitation. In: Proceedings of the IEEE Symposium on Security and Privacy; May 2001. p. 214-29.
-
-
-
-
9
-
-
0037244529
-
Reducing internet-based intrusions: effective security patch management
-
Brykczynski B., and Small R.A. Reducing internet-based intrusions: effective security patch management. IEEE Software 20 1 (January-February 2003) 50-57
-
(2003)
IEEE Software
, vol.20
, Issue.1
, pp. 50-57
-
-
Brykczynski, B.1
Small, R.A.2
-
11
-
-
0031123773
-
A quantitative model of the security intrusion process based on attacker behavior
-
Jonsson E., and Olovsson T. A quantitative model of the security intrusion process based on attacker behavior. IEEE Transactions on Software Engineering 24 3 (April 1997) 235-245
-
(1997)
IEEE Transactions on Software Engineering
, vol.24
, Issue.3
, pp. 235-245
-
-
Jonsson, E.1
Olovsson, T.2
-
12
-
-
84974774507
-
Towards operational measures of computer security
-
Littlewood B., Brocklehurst S., Fenton N., Mellor P., Page S., and Wright D. Towards operational measures of computer security. Journal of Computer Security 2 2/3 (1993) 211-230
-
(1993)
Journal of Computer Security
, vol.2
, Issue.2-3
, pp. 211-230
-
-
Littlewood, B.1
Brocklehurst, S.2
Fenton, N.3
Mellor, P.4
Page, S.5
Wright, D.6
-
14
-
-
0036926468
-
-
Madan BB, Goseva-Popstojanova K, Vaidyanathan K, Trivedi KS. Modeling and quantification of security attributes of software systems. In: Proceedings of the IEEE international performance and dependability symposium (IPDS 2002); June 2002.
-
-
-
-
15
-
-
0031336792
-
-
Malaiya YK, Denton J. What do the software reliability growth model parameters represent? In: International symposium on software reliability engineering; 1997. p. 124-35.
-
-
-
-
16
-
-
0034542613
-
-
Malaiya YK, Denton J. Module size distribution and defect density. In: Proceedings of the IEEE international symposium on software reliability engineering; October 2000. p. 62-71.
-
-
-
-
17
-
-
2342581753
-
From the ground up: the DIMACS software security workshop
-
McGraw G. From the ground up: the DIMACS software security workshop. IEEE Security & Privacy 1 2 (March/April 2003) 59-66
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.2
, pp. 59-66
-
-
McGraw, G.1
-
19
-
-
4544225763
-
-
Mohagheghi P, Conradi R, Killi OM, Schwarz H. An empirical study of software reuse vs. defect-density. In: Proceedings of the 26th international conference on software engineering; May 2004. p. 282-91.
-
-
-
-
21
-
-
34248325941
-
-
National Vulnerability Database; February 2005. .
-
-
-
-
26
-
-
14744276335
-
Is finding security holes a good idea?
-
Rescorla E. Is finding security holes a good idea?. Economics of Information Security 3 1 (January-February 2005) 14-19
-
(2005)
Economics of Information Security
, vol.3
, Issue.1
, pp. 14-19
-
-
Rescorla, E.1
|