-
1
-
-
72449142536
-
-
ISO 27000 website
-
ISO 27000 website: http://www.27000.org
-
-
-
-
4
-
-
84882594747
-
Time-To-Compromise Model for cyber risk reduction estimation
-
McQueen, M. A. and Boyer, W. F. and Flynn, M. A. and Beitel, G. A. Time-To-Compromise Model for cyber risk reduction estimation. Quality of Protection - Security measurements and metrics, 2006, pp 49-64.
-
(2006)
Quality of Protection - Security measurements and metrics
, pp. 49-64
-
-
McQueen, M.A.1
Boyer, W.F.2
Flynn, M.A.3
Beitel, G.A.4
-
5
-
-
72449180264
-
-
PhD Thesis, LAAS-CNRS, INSA de Toulouse, 7 Dec
-
Alata, E. Observation, caractérisation et modélisation de processus d'attaques sur Internet. PhD Thesis, LAAS-CNRS, INSA de Toulouse, 7 Dec. 2007.
-
(2007)
Observation, caractérisation et modélisation de processus d'attaques sur Internet
-
-
Alata, E.1
-
6
-
-
0012581483
-
The Möbius Modeling Tool. In Proceedings of the 9th international Workshop on Petri Nets and Performance Models (Pnpm'01) (September 11 - 14, 2001). PNPM
-
Washington, DC
-
Clark, G., Courtney, T., Daly, D., Deavours, D., Derisavi, S., Doyle, J. M., Sanders, W. H., and Webster, P. 2001. The Möbius Modeling Tool. In Proceedings of the 9th international Workshop on Petri Nets and Performance Models (Pnpm'01) (September 11 - 14, 2001). PNPM. IEEE Computer Society, Washington, DC, 241.
-
(2001)
IEEE Computer Society
, pp. 241
-
-
Clark, G.1
Courtney, T.2
Daly, D.3
Deavours, D.4
Derisavi, S.5
Doyle, J.M.6
Sanders, W.H.7
Webster, P.8
-
7
-
-
70350452986
-
Environment characterization and system modeling approach for the quantitative evaluation of security. To be published in SAFECOMP 2009
-
September, Hamburg, Germany
-
Vache, G. Environment characterization and system modeling approach for the quantitative evaluation of security. To be published in SAFECOMP 2009, The 28th International Conference on Computer Safety, Reliability and Security 15 - 18 September 2009, Hamburg, Germany.
-
(2009)
The 28th International Conference on Computer Safety, Reliability and Security 15 - 18
-
-
Vache, G.1
-
8
-
-
38149097274
-
Impact of Vulnerability Disclosure and Patch Availability - An Empirical Analysis
-
Arora, A. and Krishnan, R. and Telang, R. and Yang, Y. "Impact of Vulnerability Disclosure and Patch Availability - An Empirical Analysis", Third Workshop on the Economics of Information Security, 2004.
-
(2004)
Third Workshop on the Economics of Information Security
-
-
Arora, A.1
Krishnan, R.2
Telang, R.3
Yang, Y.4
-
9
-
-
34248370608
-
Large-scale vulnerability analysis
-
Pisa, Italy, September 11, 15
-
Frei, S., May, M., Fiedler, U., and Plattner, B. 2006. Large-scale vulnerability analysis. In Proceedings of the 2006 SIGCOMM Workshop on Large-Scale Attack Defense (Pisa, Italy, September 11 - 15, 2006).
-
(2006)
Proceedings of the 2006 SIGCOMM Workshop on Large-Scale Attack Defense
-
-
Frei, S.1
May, M.2
Fiedler, U.3
Plattner, B.4
-
10
-
-
2442463532
-
Use of A Taxonomy of Security Faults
-
October 22-25, Baltimore, Maryland, US
-
th National Information Systems Security Conference, October 22-25, 1996, Baltimore, Maryland, US.
-
(1996)
th National Information Systems Security Conference
-
-
Aslam, T.1
Ktsul, I.2
Spafford, E.H.3
-
11
-
-
38049182956
-
Security Vulnerability Categories in Major Software Systems, Security Vulnerability Categories in Major Software Systems
-
Alhazmi, O. H., Woo, S-W., Malaiya, Y. K., Security Vulnerability Categories in Major Software Systems, Security Vulnerability Categories in Major Software Systems, Proceedings of the Third IASTED International Conference Proceedings Communication, Network, and Information Security. 2006
-
(2006)
Proceedings of the Third IASTED International Conference Proceedings Communication, Network, and Information Security
-
-
Alhazmi, O.H.1
Woo, S.-W.2
Malaiya, Y.K.3
-
13
-
-
15744370034
-
Ataxonomyofnetworkand computerattacks
-
February
-
Hansman, S. and Hunt, R., Ataxonomyofnetworkand computerattacks, Computers & Security, Volume 24, Issue 1, February 2005, Pages 31-43.
-
(2005)
Computers & Security
, vol.24
, Issue.1
, pp. 31-43
-
-
Hansman, S.1
Hunt, R.2
-
14
-
-
84877999984
-
Milk or Wine: Does Software Security Improve with Age?
-
Vancouver, B.C, Canada, July 31-August 4
-
th Usenix Security Symposium, Vancouver, B.C., Canada, July 31-August 4, 2006, pp 93-104.
-
(2006)
th Usenix Security Symposium
, pp. 93-104
-
-
Ozment, A.1
Schechter, S.E.2
-
15
-
-
14744276335
-
Fiding Security Holes a Good Idea?
-
Jan
-
Rescola, E. Is Fiding Security Holes a Good Idea?, IEEE Security and Privacy, vol. 3, no. 1, pp. 14-19, Jan. 2005.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.1
, pp. 14-19
-
-
Rescola, E.I.1
-
16
-
-
72449180724
-
-
Symantec Enterprise Security, Trends for 2008, April
-
Symantec Enterprise Security. "Symantec Global Internet Security Threat Report - Trends for 2008", vol. XIV, April 2009. http://www.symantec.com
-
(2009)
Symantec Global Internet Security Threat Report
, vol.14
-
-
-
18
-
-
72449175091
-
-
National Vulnerability Database
-
National Vulnerability Database: http://nvd.nist.gov
-
-
-
|