메뉴 건너뛰기




Volumn , Issue , 2009, Pages 526-534

Vulnerability analysis for a quantitative security evaluation

Author keywords

[No Author keywords available]

Indexed keywords

ENVIRONMENTAL FACTORS; MODEL PARAMETERS; OPEN SOURCES; QUANTITATIVE CHARACTERIZATION; QUANTITATIVE MEASURES; QUANTITATIVE SECURITY EVALUATION; SYSTEM ENVIRONMENT; VULNERABILITY ANALYSIS; VULNERABILITY LIFE CYCLE;

EID: 72449180342     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ESEM.2009.5315969     Document Type: Conference Paper
Times cited : (18)

References (23)
  • 1
    • 72449142536 scopus 로고    scopus 로고
    • ISO 27000 website
    • ISO 27000 website: http://www.27000.org
  • 6
    • 0012581483 scopus 로고    scopus 로고
    • The Möbius Modeling Tool. In Proceedings of the 9th international Workshop on Petri Nets and Performance Models (Pnpm'01) (September 11 - 14, 2001). PNPM
    • Washington, DC
    • Clark, G., Courtney, T., Daly, D., Deavours, D., Derisavi, S., Doyle, J. M., Sanders, W. H., and Webster, P. 2001. The Möbius Modeling Tool. In Proceedings of the 9th international Workshop on Petri Nets and Performance Models (Pnpm'01) (September 11 - 14, 2001). PNPM. IEEE Computer Society, Washington, DC, 241.
    • (2001) IEEE Computer Society , pp. 241
    • Clark, G.1    Courtney, T.2    Daly, D.3    Deavours, D.4    Derisavi, S.5    Doyle, J.M.6    Sanders, W.H.7    Webster, P.8
  • 7
    • 70350452986 scopus 로고    scopus 로고
    • Environment characterization and system modeling approach for the quantitative evaluation of security. To be published in SAFECOMP 2009
    • September, Hamburg, Germany
    • Vache, G. Environment characterization and system modeling approach for the quantitative evaluation of security. To be published in SAFECOMP 2009, The 28th International Conference on Computer Safety, Reliability and Security 15 - 18 September 2009, Hamburg, Germany.
    • (2009) The 28th International Conference on Computer Safety, Reliability and Security 15 - 18
    • Vache, G.1
  • 13
    • 15744370034 scopus 로고    scopus 로고
    • Ataxonomyofnetworkand computerattacks
    • February
    • Hansman, S. and Hunt, R., Ataxonomyofnetworkand computerattacks, Computers & Security, Volume 24, Issue 1, February 2005, Pages 31-43.
    • (2005) Computers & Security , vol.24 , Issue.1 , pp. 31-43
    • Hansman, S.1    Hunt, R.2
  • 14
    • 84877999984 scopus 로고    scopus 로고
    • Milk or Wine: Does Software Security Improve with Age?
    • Vancouver, B.C, Canada, July 31-August 4
    • th Usenix Security Symposium, Vancouver, B.C., Canada, July 31-August 4, 2006, pp 93-104.
    • (2006) th Usenix Security Symposium , pp. 93-104
    • Ozment, A.1    Schechter, S.E.2
  • 15
    • 14744276335 scopus 로고    scopus 로고
    • Fiding Security Holes a Good Idea?
    • Jan
    • Rescola, E. Is Fiding Security Holes a Good Idea?, IEEE Security and Privacy, vol. 3, no. 1, pp. 14-19, Jan. 2005.
    • (2005) IEEE Security and Privacy , vol.3 , Issue.1 , pp. 14-19
    • Rescola, E.I.1
  • 16
    • 72449180724 scopus 로고    scopus 로고
    • Symantec Enterprise Security, Trends for 2008, April
    • Symantec Enterprise Security. "Symantec Global Internet Security Threat Report - Trends for 2008", vol. XIV, April 2009. http://www.symantec.com
    • (2009) Symantec Global Internet Security Threat Report , vol.14
  • 18
    • 72449175091 scopus 로고    scopus 로고
    • National Vulnerability Database
    • National Vulnerability Database: http://nvd.nist.gov


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.