-
1
-
-
0036539272
-
Risk analysis: A subjective process
-
April
-
Redmill, F.: Risk analysis: A subjective process. Engineering Management Journal 12(2) (April 2002) 91-96
-
(2002)
Engineering Management Journal
, vol.12
, Issue.2
, pp. 91-96
-
-
Redmill, F.1
-
2
-
-
84882663975
-
Assessing the risk of using vulnerable components
-
In Gollmann, D., Massacci, F., Yautsiukhin, A., eds.: New York, NY, USA, Springer-Verlag (June
-
Sicari, S., Balzarotti, D., Monga, M.: Assessing the risk of using vulnerable components. In Gollmann, D., Massacci, F., Yautsiukhin, A., eds.: Quality of Protection. Security Measurements and Metrics, New York, NY, USA, Springer-Verlag (June 2006) 65-78
-
(2006)
Quality of Protection. Security Measurements and Metrics
, pp. 65-78
-
-
Sicari, S.1
Balzarotti, D.2
Monga, M.3
-
6
-
-
33846674492
-
-
October
-
Alberts, C., Dorofee, A., Stevens, J., Woody, C.: Introduction to the Octave approach (October 2003)
-
(2003)
Introduction to the Octave Approach
-
-
Alberts, C.1
Dorofee, A.2
Stevens, J.3
Woody, C.4
-
7
-
-
85189788266
-
The CORAS methodology: Model-based risk management using UML and UP
-
In Favre, L., ed.: IRM Press
-
den Braber, F., Dimitrakos, T., Gran, B., Lund, M., Stølen, K., Aagedal, J.: The CORAS methodology: Model-based risk management using UML and UP. In Favre, L., ed.: UML and the Unified Process. IRM Press (2003) 332-357
-
(2003)
UML and the Unified Process
, pp. 332-357
-
-
Den Braber, F.1
Dimitrakos, T.2
Gran, B.3
Lund, M.4
Stølen, K.5
Aagedal, J.6
-
10
-
-
1142292428
-
Managing vulnerabilities of information system to security incidents
-
New York, NY, USA, ACM Press
-
Sharp, G., Enslow, P., Navathe, S., Farahmand, F.: Managing vulnerabilities of information system to security incidents. In: ICEC '03: Proceedings of the 5th International Conference on Electronic Commerce, New York, NY, USA, ACM Press (2003) 348-354
-
(2003)
ICEC '03: Proceedings of the 5th International Conference on Electronic Commerce
, pp. 348-354
-
-
Sharp, G.1
Enslow, P.2
Navathe, S.3
Farahmand, F.4
-
11
-
-
0027804413
-
Information system security design methods: Implications for information systems development
-
Baskerville, R.: Information system security design methods: Implications for information systems development. ACM Computing Survey 25(4) (1993) 375-412
-
(1993)
ACM Computing Survey
, vol.25
, Issue.4
, pp. 375-412
-
-
Baskerville, R.1
-
12
-
-
10944259927
-
Risk-based system security engineering: Stopping attacks with intention
-
Evans, S., Heinbuch, D., E.Kyle, Piorkowski, J., J.Wallener: Risk-based system security engineering: Stopping attacks with intention. IEEE Security &Privacy Magazine 2(6) (2004) 59-62
-
(2004)
IEEE Security &Privacy Magazine
, vol.2
, Issue.6
, pp. 59-62
-
-
Evans, S.1
Heinbuch, D.2
Kyle, E.3
Piorkowski, J.4
Wallener, J.5
-
13
-
-
85029618768
-
An insecurity flow model
-
New York, NY, USA, ACM Press
-
Moskowitz, I., Kang, M.: An insecurity flow model. In: NSPW '97: Proceedings of the 1997 Workshop on New Security Paradigms, New York, NY, USA, ACM Press (1997) 61-74
-
(1997)
NSPW '97: Proceedings of the 1997 Workshop on New Security Paradigms
, pp. 61-74
-
-
Moskowitz, I.1
Kang, M.2
-
14
-
-
84944727025
-
Efficient minimum-cost network hardening via exploit dependency graphs
-
Noel, S., Jajoidia, S., O'Berry, B., Jacobs, M.: Efficient minimum-cost network hardening via exploit dependency graphs. In: ACSAC '03: Proceedings of 19th Annual Computer Security Applications Conference, IEEE Computer Society (2003) 86-95
-
(2003)
ACSAC '03: Proceedings of 19th Annual Computer Security Applications Conference, IEEE Computer Society
, pp. 86-95
-
-
Noel, S.1
Jajoidia, S.2
O'berry, B.3
Jacobs, M.4
-
15
-
-
0036083194
-
Automated generation and analysis of attack graphs
-
Washington, DC, USA, IEEE Computer Society
-
Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J.: Automated generation and analysis of attack graphs. In: SP'02: Proceedings of the 2002 IEEE Symposium on Security and Privacy, Washington, DC, USA, IEEE Computer Society (2002) 273-284
-
(2002)
SP'02: Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 273-284
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.5
-
17
-
-
50849108864
-
Web metrics: The way of improvement of quality of non web-based systems
-
In Arabnia, H.R., Reza, H., eds.: CSREA Press
-
Arshad, S., Shoaib, M., Shah, A.: Web metrics: The way of improvement of quality of non web-based systems. In Arabnia, H.R., Reza, H., eds.: SERP'06: Proceedings of the International Conference on Software Engineering Research and Practice. Volume 2., CSREA Press (2006) 489-495
-
(2006)
SERP'06: Proceedings of the International Conference on Software Engineering Research and Practice
, vol.2
, pp. 489-495
-
-
Arshad, S.1
Shoaib, M.2
Shah, A.3
-
18
-
-
0028393055
-
Software measurement: A necessary scientific basis
-
Fenton, N.: Software measurement: A necessary scientific basis. IEEE Transactions on Software Engineering 20(3) (1994) 199-206
-
(1994)
IEEE Transactions on Software Engineering
, vol.20
, Issue.3
, pp. 199-206
-
-
Fenton, N.1
-
19
-
-
0035505967
-
Making decisions: Bayesian nets and mcda
-
November
-
Fenton, N., Neil, M.: Making decisions: Bayesian nets and mcda. Knowledge-Based Systems 14(7) (November 2001) 307-325
-
(2001)
Knowledge-Based Systems
, vol.14
, Issue.7
, pp. 307-325
-
-
Fenton, N.1
Neil, M.2
-
20
-
-
78651584520
-
Application of qualitative modelling to knowledgebased risk assessment studies
-
In Ali, M., ed.: New York, NY, USA, ACM Press
-
Biswas, G., Debelak, K., Kawamura, K.: Application of qualitative modelling to knowledgebased risk assessment studies. In Ali, M., ed.: IEA/AIE'89: Proceedings of the Second International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems. Volume 1., New York, NY, USA, ACM Press (1989) 92-101
-
(1989)
IEA/AIE'89: Proceedings of the Second International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems
, vol.1
, pp. 92-101
-
-
Biswas, G.1
Debelak, K.2
Kawamura, K.3
-
21
-
-
20844461569
-
Security meter: A practical decision-tree model to quantify risk
-
May/June
-
Sahinoglu, M.: Security meter: A practical decision-tree model to quantify risk. IEEE Security &Privacy 3(3) (May/June 2005) 18-24
-
(2005)
IEEE Security &Privacy
, vol.3
, Issue.3
, pp. 18-24
-
-
Sahinoglu, M.1
|