-
1
-
-
38049185474
-
Information Assurance Metrics
-
March
-
B. Nandy, P. Pieda, N. Seddigh, I. Lambadaris, A. Matrawy, and A. Hatfield, "Information Assurance Metrics," Technical Report prepared for the Canadian Federal Government Department Office of Critical Infrastructure Protection and Emergency Preparedness (OCIPEP), March 2004.
-
(2004)
Technical Report prepared for the Canadian Federal Government Department Office of Critical Infrastructure Protection and Emergency Preparedness (OCIPEP)
-
-
Nandy, B.1
Pieda, P.2
Seddigh, N.3
Lambadaris, I.4
Matrawy, A.5
Hatfield, A.6
-
2
-
-
38049185475
-
-
N. Seddigh, P. Pieda, A. Matrawy, B. Nandy, I. Lambadaris, and A. Hatfield, Current Trends and Advances in Information Assurance Metrics, In Proc. of the Second Annual Conf. on Privacy, Security, and Trust, PST2004, Fredericton, NB, October 2004.
-
N. Seddigh, P. Pieda, A. Matrawy, B. Nandy, I. Lambadaris, and A. Hatfield, "Current Trends and Advances in Information Assurance Metrics," In Proc. of the Second Annual Conf. on Privacy, Security, and Trust, PST2004, Fredericton, NB, October 2004.
-
-
-
-
3
-
-
38049141961
-
-
(2005, July) Common Criteria for Information Technology Security Evaluation - Part 1 : CCMB-2005-07-001; Part 2: CCMB-2005-07-002; Part 3: CCMB-2005-07-003; Part 4: CCMB-2005-07-004, Version 3.0, Revision 2. CC.
-
(2005, July) Common Criteria for Information Technology Security Evaluation - Part 1 : CCMB-2005-07-001; Part 2: CCMB-2005-07-002; Part 3: CCMB-2005-07-003; Part 4: CCMB-2005-07-004, Version 3.0, Revision 2. CC.
-
-
-
-
5
-
-
2342576368
-
Does the Common Criteria Paradigm Have a Future?
-
January/February
-
J. Hearn, "Does the Common Criteria Paradigm Have a Future?" IEEE Security and Privacy, vol. 2, no. 1, January/February 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.1
-
-
Hearn, J.1
-
6
-
-
0345097590
-
-
J. Lee, J. Lee, S. Lee, and B. Choi, A CC-based Security Engineering Process Evaluation Model, In Proc. of the 27th Annual Intern. Computer Software and Appl. Conf, COMPSAC.03, November 2003
-
J. Lee, J. Lee, S. Lee, and B. Choi, "A CC-based Security Engineering Process Evaluation Model," In Proc. of the 27th Annual Intern. Computer Software and Appl. Conf. (COMPSAC.03), November 2003.
-
-
-
-
7
-
-
38049111160
-
-
The systems security engineering capability maturity model project, version 3 (final version). SSE-CMM. [Online]. Available: http://www.sse-cmm.org/docs/ssecmmv3final.pdf
-
(2003) The systems security engineering capability maturity model project, version 3 (final version). SSE-CMM. [Online]. Available: http://www.sse-cmm.org/docs/ssecmmv3final.pdf
-
-
-
-
8
-
-
84969544889
-
-
R. B. Vaughn, R. Henning, and A. Siraj, Information Assurance Measures and Metrics - State of Practice and Proposed Taxonomy, In Proc. of the 36th Hawaii Intern. Conf. on Sys. Sc. (HICSS-36), January 2003.
-
R. B. Vaughn, R. Henning, and A. Siraj, "Information Assurance Measures and Metrics - State of Practice and Proposed Taxonomy," In Proc. of the 36th Hawaii Intern. Conf. on Sys. Sc. (HICSS-36), January 2003.
-
-
-
-
9
-
-
12244283592
-
Security Metrics Guide for Information Technology Systems
-
M. Swanson, N. Bartol, J. Sabato, J. Hash, and L. Graffo, "Security Metrics Guide for Information Technology Systems," National Institute of Standards and Technology (NIST), Special Publication 800-55.
-
National Institute of Standards and Technology (NIST), Special Publication 800-55
-
-
Swanson, M.1
Bartol, N.2
Sabato, J.3
Hash, J.4
Graffo, L.5
-
10
-
-
85090433665
-
-
M. Roesch, Snort: Lightweight Intrusion Detection for Networks, In Proceedings of USENIX LISA99, the 13th Systems Administration Conference, November 1999. [Online]. Available: http://www.snort.org
-
M. Roesch, "Snort: Lightweight Intrusion Detection for Networks," In Proceedings of USENIX LISA99, the 13th Systems Administration Conference, November 1999. [Online]. Available: http://www.snort.org
-
-
-
-
11
-
-
10444220813
-
Making Hard Decisions with DecisionTools
-
ISBN: 0-534-36597-3
-
R. T. Clemen and T. Reilly, "Making Hard Decisions with DecisionTools," Duxbury/Thomson Learning, 2001, ISBN: 0-534-36597-3.
-
(2001)
Duxbury/Thomson Learning
-
-
Clemen, R.T.1
Reilly, T.2
-
12
-
-
38049145032
-
Snort Users Manual 2.4.0
-
August, Online, Available
-
M. Roesch, C. Green, and Sourcefire., "Snort Users Manual 2.4.0," The Snort Project, August 2005. [Online]. Available: http://www.snort.org/docs/snort_manual.pdf
-
(2005)
The Snort Project
-
-
Roesch, M.1
Green, C.2
Sourcefire3
-
13
-
-
38049161145
-
-
(Collected in 2005) Packet Traces from WIDE Backbone stored in the MAWI Working Group Traffic Archive. MAWI. [Online]. Available: http://tracer.csl. sony.co.jp/mawi
-
(Collected in 2005) Packet Traces from WIDE Backbone stored in the MAWI Working Group Traffic Archive. MAWI. [Online]. Available: http://tracer.csl. sony.co.jp/mawi
-
-
-
|