-
3
-
-
0002670359
-
Attack trees: Modeling security threats
-
Dec
-
B. Schneier. Attack trees: Modeling security threats. DrDobbs Journal, Dec., 1999
-
(1999)
DrDobbs Journal
-
-
Schneier, B.1
-
5
-
-
33745458448
-
Risk-based Security Engineering through the Eyes of the Adversary
-
15-17 June, West Point, NewYork. IEEE Computer Society Press
-
Shelby Evans, James Waller. Risk-based Security Engineering through the Eyes of the Adversary. In: Proceedings of the sixth IEEE Systems, Man and Cybernetics Information Assurance Workshop. 15-17 June 2005. West Point, NewYork. IEEE Computer Society Press, 2005: 158- 165
-
(2005)
Proceedings of the sixth IEEE Systems, Man and Cybernetics Information Assurance Workshop
, pp. 158-165
-
-
Evans, S.1
Waller, J.2
-
6
-
-
47349104969
-
Mission Oriented Risk and Design Analysis for Critical Information Systems, Innovative Decisions, Inc
-
Technical Report 2004-02, September
-
Buckshaw, et al. Mission Oriented Risk and Design Analysis for Critical Information Systems, Innovative Decisions, Inc, Technical Report 2004-02, September, 2004.
-
(2004)
-
-
Buckshaw1
-
7
-
-
28044457328
-
Information Technology - Security Techniques - Code of Practice for Information Security Management,
-
ISO. ISO/IEC 17799
-
ISO. ISO/IEC 17799: Information Technology - Security Techniques - Code of Practice for Information Security Management, 2005
-
(2005)
-
-
-
8
-
-
47349108762
-
-
Gary Stoneburner, Alice Goguen, andAlexis Feringa. Risk Management Guide for Information Technology Systems. NIST Special Publication 800-30. July 2002
-
Gary Stoneburner, Alice Goguen, andAlexis Feringa. Risk Management Guide for Information Technology Systems. NIST Special Publication 800-30. July 2002
-
-
-
-
9
-
-
47349096732
-
-
BSI. BS7799 C Code of Practice for Information Security Management, British Standards Institute, 1999
-
BSI. BS7799 C Code of Practice for Information Security Management, British Standards Institute, 1999
-
-
-
-
10
-
-
47349123397
-
-
SSE-CMM Model Description Document Version 3.0. Carnegie Mellon University. June 15, 2003
-
SSE-CMM Model Description Document Version 3.0. Carnegie Mellon University. June 15, 2003
-
-
-
-
11
-
-
47349127289
-
-
Microsoft Corporation. The Microsoft Security Risk Management Guide v 1.1. October 25, 2004
-
Microsoft Corporation. The Microsoft Security Risk Management Guide v 1.1. October 25, 2004
-
-
-
-
12
-
-
47349127797
-
-
CRAMMV5C http://www.cramm.com/
-
CRAMMV5C http://www.cramm.com/
-
-
-
-
13
-
-
47349122890
-
-
COBRA C http://www.riskworld.net/
-
COBRA C http://www.riskworld.net/
-
-
-
-
15
-
-
47349118250
-
-
Callio Secura C http://www.callio.com/
-
, vol.100
-
-
-
18
-
-
47349099367
-
-
Mehmet Sahinoglu. Security Meter: A Practical Decision-Tree Model to Quantify Risk. IEEE Security & Privacy, pp. 14-24, May/June 2005 32, no. 8/9, pp. 365-376, 2004
-
Mehmet Sahinoglu. Security Meter: A Practical Decision-Tree Model to Quantify Risk. IEEE Security & Privacy, pp. 14-24, May/June 2005 Vol. 32, no. 8/9, pp. 365-376, 2004
-
-
-
-
19
-
-
14744281156
-
Toward Econometric Models of the Security Risk from Remote Attacks
-
January/February
-
Stuart E. Schechter. Toward Econometric Models of the Security Risk from Remote Attacks. IEEE Security & Privacy, January/February 2005: 40 - 44
-
(2005)
IEEE Security & Privacy
, pp. 40-44
-
-
Schechter, S.E.1
|