-
1
-
-
36448932252
-
Multiple design patterns for VoIP security
-
Z. Anwar, W. Yurcik, R. Johnson, M. Hafiz and R. Campbell, Multiple design patterns for VoIP security, Proceedings of the Twenty-Fifth IEEE Conference on Performance, Computing and Communications, 2006.
-
(2006)
Proceedings of the Twenty-Fifth IEEE Conference on Performance, Computing and Communications
-
-
Anwar, Z.1
Yurcik, W.2
Johnson, R.3
Hafiz, M.4
Campbell, R.5
-
2
-
-
36448953716
-
-
F. Buschmann, R. Meunier, H. Rohnert, P. Sommerlad and M. Stal, Pattern-Oriented Software Architecture: A System of Patterns, 1 Wiley, Chichester, United Kingdom, 1996.
-
F. Buschmann, R. Meunier, H. Rohnert, P. Sommerlad and M. Stal, Pattern-Oriented Software Architecture: A System of Patterns, Volume 1 Wiley, Chichester, United Kingdom, 1996.
-
-
-
-
3
-
-
33745206257
-
Investigating sophisticated security breaches
-
E. Casey, Investigating sophisticated security breaches, Communications of the ACM, vol. 43(2), 48-54, 2006.
-
(2006)
Communications of the ACM
, vol.43
, Issue.2
, pp. 48-54
-
-
Casey, E.1
-
4
-
-
36448989215
-
-
CERT Coordination Center, Pittsburgh, Pennsylvania
-
CERT Coordination Center, Carnegie Mellon University, Pittsburgh, Pennsylvania (www.cert.org).
-
-
-
-
7
-
-
84899175349
-
A methodology to develop secure systems using patterns
-
H. Mouratidis and P. Giorgini Eds, IGI Publishing, Hershey, Pennsylvania, pp
-
E. Fernandez, M. Larrondo-Petrie, T. Sorgente and M. VanHilst, A methodology to develop secure systems using patterns, in Integrating Security and Software Engineering: Advances and Future Vision, H. Mouratidis and P. Giorgini (Eds.), IGI Publishing, Hershey, Pennsylvania, pp. 107-126, 2006.
-
(2006)
Integrating Security and Software Engineering: Advances and Future Vision
, pp. 107-126
-
-
Fernandez, E.1
Larrondo-Petrie, M.2
Sorgente, T.3
VanHilst, M.4
-
9
-
-
33845264120
-
Defining security requirements through misuse actions
-
S. Ochoa and G. Roman Eds, Springer, New York
-
E. Fernandez, M. VanHilst, M. Larrondo-Petrie and S. Huang, Defining security requirements through misuse actions, in Advanced Software Engineering: Expanding the Frontiers of Software Technology, S. Ochoa and G. Roman (Eds.), Springer, New York, 123-137, 2006.
-
(2006)
Advanced Software Engineering: Expanding the Frontiers of Software Technology
, pp. 123-137
-
-
Fernandez, E.1
VanHilst, M.2
Larrondo-Petrie, M.3
Huang, S.4
-
10
-
-
0003880013
-
-
Boston, Massachusetts
-
E. Gamma, R. Helm, R. Johnson and J. Vlissides, Design Patterns: Elements of Reusable Object-Oriented Software, Addison-Wesley/ Pearson, Boston, Massachusetts, 1994.
-
(1994)
Design Patterns: Elements of Reusable Object-Oriented Software, Addison-Wesley/ Pearson
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.4
-
12
-
-
36448941716
-
-
NIST Special Publication 800-86, National Institute of Standards and Technology, Gaithersburg, Maryland
-
K. Kent, S. Chevalier, T. Grance and H. Dang, Guide to Integrating Forensic Techniques into Incident Response, NIST Special Publication 800-86, National Institute of Standards and Technology, Gaithersburg, Maryland, 2006.
-
(2006)
Guide to Integrating Forensic Techniques into Incident Response
-
-
Kent, K.1
Chevalier, S.2
Grance, T.3
Dang, H.4
-
13
-
-
85055394531
-
-
CRC Press, Boca Raton, Florida
-
P. Laplante and C. Neill, AntiPatterns: Identification, Refactoring and Management, CRC Press, Boca Raton, Florida, 2006.
-
(2006)
AntiPatterns: Identification, Refactoring and Management
-
-
Laplante, P.1
Neill, C.2
-
14
-
-
0028495490
-
Requirements specification for process-control systems
-
N. Leveson, M. Heimdahl, H. Hildreth and J. Reese, Requirements specification for process-control systems, IEEE Transactions on Software Engineering, vol. 20(9), pp. 684-707, 1994.
-
(1994)
IEEE Transactions on Software Engineering
, vol.20
, Issue.9
, pp. 684-707
-
-
Leveson, N.1
Heimdahl, M.2
Hildreth, H.3
Reese, J.4
-
16
-
-
0038226150
-
-
Technical Note CMU/SEI-2001-TN-001, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, Pennsylvania
-
A. Moore, R. Ellison and R. Linger, Attack modeling for information security and survability, Technical Note CMU/SEI-2001-TN-001, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, Pennsylvania, 2001.
-
(2001)
Attack modeling for information security and survability
-
-
Moore, A.1
Ellison, R.2
Linger, R.3
-
17
-
-
36448959317
-
-
J. Pelaez, Security in VoIP networks. Master's Thesis, Department of Computer Science and Engineering, Florida Atlantic University, Boca Raton, Florida, 2004.
-
J. Pelaez, Security in VoIP networks. Master's Thesis, Department of Computer Science and Engineering, Florida Atlantic University, Boca Raton, Florida, 2004.
-
-
-
-
18
-
-
33750050331
-
-
Wiley, Chichester, United Kingdom
-
M. Schumacher, E. Fernandez, D. Hybertson, F. Buschmann and P. Sommerlad, Security Patterns: Integrating Security and Systems Engineering, Wiley, Chichester, United Kingdom, 2006.
-
(2006)
Security Patterns: Integrating Security and Systems Engineering
-
-
Schumacher, M.1
Fernandez, E.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
19
-
-
35248838230
-
ForNet: A distributed forensics network
-
K. Shanmugasundaram, N. Memon, A. Savant and H. Bronnimann, ForNet: A distributed forensics network, Proceedings of the Second International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security, pp. 1-16, 2003.
-
(2003)
Proceedings of the Second International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security
, pp. 1-16
-
-
Shanmugasundaram, K.1
Memon, N.2
Savant, A.3
Bronnimann, H.4
|