-
1
-
-
70350442536
-
-
U.S. Department of Defence Trusted Computer Security Evaluation Criteria
-
U.S. Department of Defence Trusted Computer Security Evaluation Criteria (1985)
-
(1985)
-
-
-
3
-
-
70350446926
-
-
Common Criteria for Information Technology Security Evaluation 1996
-
Common Criteria for Information Technology Security Evaluation (1996)
-
-
-
-
4
-
-
70350450524
-
Requirements for Information security management systems
-
ISO/IEC 27001
-
ISO/IEC 27001:2005, Requirements for Information security management systems (2005)
-
(2005)
-
-
-
5
-
-
0003692134
-
Code of practice for information security management
-
ISO/IEC 27002
-
ISO/IEC 27002:2005, Code of practice for information security management (2005)
-
(2005)
-
-
-
7
-
-
0003968557
-
-
Cépaduès
-
Laprie, J., Arlat, J., Blanquart, J., Costes, A., Deswarte, Y., Fabre, J., Guillermain, H., Kaǎniche, M., Kanoun, K., Mazet, C., Powell, D., Rabéjac, C., Thévenod, P.: Guide de la Sǔreté de Fonctionnement, Cépaduès (1995)
-
(1995)
Guide de la Sǔreté de Fonctionnement
-
-
Laprie, J.1
Arlat, J.2
Blanquart, J.3
Costes, A.4
Deswarte, Y.5
Fabre, J.6
Guillermain, H.7
Kaǎniche, M.8
Kanoun, K.9
Mazet, C.10
Powell, D.11
Rabéjac, C.12
Thévenod, P.13
-
8
-
-
0028518284
-
On measurement of operational security
-
IEEE
-
Brocklehurst, S., Littlewood, B., Olovsson, T., Jonsson, E.: On measurement of operational security. Aerospace and Electronic Systems Magazine, IEEE 9, 7-16 (1994)
-
(1994)
Aerospace and Electronic Systems Magazine
, vol.9
, pp. 7-16
-
-
Brocklehurst, S.1
Littlewood, B.2
Olovsson, T.3
Jonsson, E.4
-
9
-
-
33749052613
-
Vers une évaluation quantitative de la sécurité informatique
-
Thèse de doctorat LAAS-CNRS , in french
-
Dacier, M.: Vers une évaluation quantitative de la sécurité informatique, Thèse de doctorat LAAS-CNRS (1994) (in french)
-
(1994)
-
-
Dacier, M.1
-
11
-
-
0033325475
-
Experimenting with quantitative evaluation tools for monitoring operational security
-
Ortalo, R., Deswarte, Y., Kaaniche, M.: Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering 25, 633-650 (1999)
-
(1999)
IEEE Transactions on Software Engineering
, vol.25
, pp. 633-650
-
-
Ortalo, R.1
Deswarte, Y.2
Kaaniche, M.3
-
13
-
-
84948760464
-
Two formal analyses of attack graphs
-
Jha, S., Sheyner, O., Wing, J.: Two formal analyses of attack graphs. In: Proceedings of 15th IEEE Computer Security Foundations Workshop, 2002, pp. 49-63 (2002)
-
(2002)
Proceedings of 15th IEEE Computer Security Foundations Workshop
, pp. 49-63
-
-
Jha, S.1
Sheyner, O.2
Wing, J.3
-
14
-
-
84964504906
-
Computer-attack graph generation tool
-
Swiler, L., Phillips, C., Ellis, D., Chakerian, S.: Computer-attack graph generation tool. In: Proceedings of DARPA Information Survivability Conference & Exposition II, DISCEX 2001, vol. 2, pp. 307-321 (2001)
-
(2001)
Proceedings of DARPA Information Survivability Conference & Exposition II, DISCEX
, vol.2
, pp. 307-321
-
-
Swiler, L.1
Phillips, C.2
Ellis, D.3
Chakerian, S.4
-
15
-
-
84882663975
-
-
Springer, Heidelberg
-
Balzarotti, D., Monga, M., Sicari, S.: Assessing the risk of using vulnerable component, Quality of Protection, pp. 65-77. Springer, Heidelberg (2006)
-
(2006)
Assessing the risk of using vulnerable component, Quality of Protection
, pp. 65-77
-
-
Balzarotti, D.1
Monga, M.2
Sicari, S.3
-
16
-
-
84882594747
-
-
Springer, Heidelberg
-
McQueen, M.A., Boyer, W.F., Flynn, M.A., Beitel, G.A.: Time-to-Compromise model for cyber risk reduction estimation, Quality of Protection, pp. 49-64. Springer, Heidelberg (2006)
-
(2006)
Time-to-Compromise model for cyber risk reduction estimation, Quality of Protection
, pp. 49-64
-
-
McQueen, M.A.1
Boyer, W.F.2
Flynn, M.A.3
Beitel, G.A.4
-
17
-
-
70350441558
-
-
Mell, P., Scarfone, K., Romanovsky, S.: CVSS v2 Complete Documentation. ccvs (June 2007)
-
Mell, P., Scarfone, K., Romanovsky, S.: CVSS v2 Complete Documentation. ccvs (June 2007)
-
-
-
-
18
-
-
34248370608
-
Large-scale vulnerability analysis
-
Pisa, Italy, pp, ACM, New York
-
Frei, S., May, M., Fiedler, U., Plattner, B.: Large-scale vulnerability analysis. In: Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense, Pisa, Italy, pp. 131-138. ACM, New York (2006)
-
(2006)
Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense
, pp. 131-138
-
-
Frei, S.1
May, M.2
Fiedler, U.3
Plattner, B.4
-
19
-
-
34547974467
-
Estimating Software Vulnerabilities
-
Jones, J.R.: Estimating Software Vulnerabilities. IEEE Security and Privacy 5, 28-32 (2007)
-
(2007)
IEEE Security and Privacy
, vol.5
, pp. 28-32
-
-
Jones, J.R.1
-
21
-
-
84870666315
-
-
SecurityFocus, http://www.securityfocus.org
-
SecurityFocus
-
-
-
22
-
-
70350461634
-
Conceptual Model and Architecture of MAFTIA, MAFTIA (Malicious and Accidental Fault Tolerance for Internet Applications) project deliverable D21
-
MAFTIA Consortium, 03011
-
MAFTIA Consortium, Conceptual Model and Architecture of MAFTIA, MAFTIA (Malicious and Accidental Fault Tolerance for Internet Applications) project deliverable D21, LAAS-CNRS Report 03011 (1993)
-
(1993)
LAAS-CNRS Report
-
-
-
25
-
-
70350482434
-
-
Microsoft Security Bulletin MS02-039
-
Microsoft Security Bulletin MS02-039
-
-
-
-
26
-
-
70350461632
-
-
Computer Security Research, McAfee Avert Labs Blog
-
Computer Security Research - McAfee Avert Labs Blog
-
-
-
-
29
-
-
0742276097
-
Inside the Slammer worm
-
Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S., Weaver, N.: Inside the Slammer worm. Security & Privacy 1, 33-39 (2003)
-
(2003)
Security & Privacy
, vol.1
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
|