-
1
-
-
0035789229
-
The Quest for Security in Mobile Ad Hoc Networks
-
J.-P. Hubaux, L. Buttyán, and S. Čapkun, "The Quest for Security in Mobile Ad Hoc Networks," 2nd ACM Int. Symp. Mobile Ad Hoc Networking and Computing (MobiHoc), 2001, 146-155.
-
(2001)
2nd ACM Int. Symp. Mobile Ad Hoc Networking and Computing (MobiHoc)
, pp. 146-155
-
-
Hubaux, J.-P.1
Buttyán, L.2
Čapkun, S.3
-
2
-
-
1842815887
-
Security in Mobile Ad Hoc Networks: Challenges and Solutions
-
Feb
-
H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, "Security in Mobile Ad Hoc Networks: Challenges and Solutions," IEEE Wireless Comm., Vol. 11, No. 1., Feb. 2004, 38-47.
-
(2004)
IEEE Wireless Comm
, vol.11
, Issue.1
, pp. 38-47
-
-
Yang, H.1
Luo, H.2
Ye, F.3
Lu, S.4
Zhang, L.5
-
3
-
-
0033357103
-
Securing Ad Hoc Networks
-
Nov/Dec
-
L. Zhou and Z. J. Haas, "Securing Ad Hoc Networks," IEEE Network, Vol. 13, No. 6, Nov/Dec 1999, 24-30.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
5
-
-
12344308304
-
Basic Concepts and Taxonomy of Dependable and Secure Computing
-
Jan/Mar
-
A. Avižienis, J.-C. Laprie, B. Randell and C. Landwehr, "Basic Concepts and Taxonomy of Dependable and Secure Computing," IEEE Tr. on Dependable and Secure Computing, Vol. 1, No. 1, Jan/Mar 2004, 11-33.
-
(2004)
IEEE Tr. on Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 11-33
-
-
Avižienis, A.1
Laprie, J.-C.2
Randell, B.3
Landwehr, C.4
-
7
-
-
33745493480
-
SSE-CMM Security Metrics
-
Washington, D.C
-
G. Jelen, "SSE-CMM Security Metrics," NIST and CSSPAB Workshop, Washington, D.C., 2000.
-
(2000)
NIST and CSSPAB Workshop
-
-
Jelen, G.1
-
8
-
-
78651559667
-
On Assurance, Measures, and Metrics: Definitions and Approaches
-
Williamsburg, Virginia, May, 2001, publ
-
J. I. Alger, "On Assurance, Measures, and Metrics: Definitions and Approaches," Information Security System Scoring and Ranking (WISSSR), Williamsburg, Virginia, May, 2001, publ. 2002.
-
(2002)
Information Security System Scoring and Ranking (WISSSR)
-
-
Alger, J.I.1
-
9
-
-
47849117993
-
-
SANS Institute Information Security Reading Room
-
S. C. Payne, "A Guide to Security Metrics," SANS Institute Information Security Reading Room, 2006.
-
(2006)
A Guide to Security Metrics
-
-
Payne, S.C.1
-
11
-
-
78651570681
-
Security Metrology and the Monty Hall Problem
-
Williamsburg, Virginia, May, 2001, publ
-
B. S. Yee, "Security Metrology and the Monty Hall Problem," Information Security System Scoring and Ranking (WISSSR), ACSA and MITRE, Williamsburg, Virginia, May, 2001, publ. 2002.
-
(2002)
Information Security System Scoring and Ranking (WISSSR), ACSA and MITRE
-
-
Yee, B.S.1
-
13
-
-
78651523165
-
Workshop on Information Security Scoring and Ranking - Information System Security Attribute Quantification or Ordering
-
R. Henning (Ed.)
-
R. Henning (Ed.), Workshop on Information Security Scoring and Ranking - Information System Security Attribute Quantification or Ordering. Applied Computer Security Associates, 2001.
-
(2001)
Applied Computer Security Associates
-
-
-
14
-
-
67649915007
-
Quantitative Measures of Assurance: Prophecy, Process or Pipedream?
-
Williamsburg, Virginia, May, 2001, publ
-
J. McHugh, "Quantitative Measures of Assurance: Prophecy, Process or Pipedream?" Information Security System Scoring and Ranking (WISSSR), ACSA and MITRE, Williamsburg, Virginia, May, 2001, publ. 2002.
-
(2002)
Information Security System Scoring and Ranking (WISSSR), ACSA and MITRE
-
-
McHugh, J.1
-
15
-
-
78651568602
-
The Case against Numerical Measures of Information Assurance
-
Williamsburg, Virginia, May, 2001, publ
-
D. McCallam, "The Case against Numerical Measures of Information Assurance," Proc. of Workshop on Information Security System Scoring and Ranking (WISSSR), ACSA and MITRE, Williamsburg, Virginia, May, 2001, publ. 2002.
-
(2002)
Proc. of Workshop on Information Security System Scoring and Ranking (WISSSR), ACSA and MITRE
-
-
McCallam, D.1
-
16
-
-
33747205462
-
On the Brittleness of Software and the Infeasibility of Security Metrics
-
Jul/Aug
-
S. M. Bellovin, "On the Brittleness of Software and the Infeasibility of Security Metrics," IEEE Security & Privacy, Jul/Aug, p. 96, 2006.
-
(2006)
IEEE Security & Privacy
, pp. 96
-
-
Bellovin, S.M.1
-
17
-
-
70349260162
-
The Risks with Security Metrics
-
Conference on Computer and Communications Security archive, Alexandria, Virginia, USA, October
-
M. D. Aime, A. Atzeni and P. C. Pomi, "The Risks with Security Metrics," Conference on Computer and Communications Security archive, Proceedings of the 4th ACM workshop on Quality of Protection, 2008, Alexandria, Virginia, USA, October 27-27, 2008, 65-70.
-
(2008)
Proceedings of the 4th ACM workshop on Quality of Protection, 2008
, pp. 27-27
-
-
Aime, M.D.1
Atzeni, A.2
Pomi, P.C.3
-
18
-
-
78651533035
-
A Few Good Security Metrics
-
P. Burris, C. King, "A Few Good Security Metrics," METAGroup, 2000.
-
(2000)
METAGroup
-
-
Burris, P.1
King, C.2
-
19
-
-
0035195322
-
Why is it so Hard to Predict Software System Trustworthiness from Sofware Component Trustworthiness?
-
J. Voas, "Why is it so Hard to Predict Software System Trustworthiness from Sofware Component Trustworthiness?," 20th IEEE Symposium on Reliable Distributed Systems, 2001, p. 179.
-
(2001)
20th IEEE Symposium on Reliable Distributed Systems
, pp. 179
-
-
Voas, J.1
-
20
-
-
0242678584
-
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
-
S. Čapkun, L. Buttyán and J.-P. Hubaux, "Self-Organized Public-Key Management for Mobile Ad Hoc Networks," IEEE Tr. Mobile Computing, Vol. 2, No. 1, 2003, 52-64.
-
(2003)
IEEE Tr. Mobile Computing
, vol.2
, Issue.1
, pp. 52-64
-
-
Čapkun, S.1
Buttyán, L.2
Hubaux, J.-P.3
-
21
-
-
84883869163
-
Self-Securing Ad Hoc Wireless Networks
-
H. Luo, P. Zerfos, J. Kong and L. Zhang, "Self-Securing Ad Hoc Wireless Networks," 7th Int. Symp. on Computers and Communications (ISCC), 2002, 567-574.
-
(2002)
7th Int. Symp. on Computers and Communications (ISCC)
, pp. 567-574
-
-
Luo, H.1
Zerfos, P.2
Kong, J.3
Zhang, L.4
-
22
-
-
0036452448
-
Context Aware Detection of Selfish Nodes in DSR Based Ad Hoc Networks
-
K. Paul and D. Westhoff, "Context Aware Detection of Selfish Nodes in DSR Based Ad Hoc Networks," IEEE Vehicular Technology Conference, Vol. 56, No. 4., 2002, 2424-2429.
-
(2002)
IEEE Vehicular Technology Conference
, vol.56
, Issue.4
, pp. 2424-2429
-
-
Paul, K.1
Westhoff, D.2
-
23
-
-
0035178273
-
Security Enhancements in AODV Protocol for Wireless Ad Hoc Networks
-
Fall
-
S. Bhargava and D. P. Agrawal, "Security Enhancements in AODV Protocol for Wireless Ad Hoc Networks," IEEE Vehicular Technology Conference (VTC 2001) Fall, Vol. 4, 2001, 2143-2147.
-
(2001)
IEEE Vehicular Technology Conference (VTC 2001)
, vol.4
, pp. 2143-2147
-
-
Bhargava, S.1
Agrawal, D.P.2
-
25
-
-
15844362443
-
Ad Hoc Networks Security
-
Basagni, S., Conti, M., Giordano, S., and Stojmenovic (Eds.), IEEE Press Wiley, New York
-
P. Michiardi and R. Molva, "Ad Hoc Networks Security," In Basagni, S., Conti, M., Giordano, S., and Stojmenovic (Eds.), Ad Hoc Networking, IEEE Press Wiley, New York, 2003.
-
(2003)
Ad Hoc Networking
-
-
Michiardi, P.1
Molva, R.2
-
26
-
-
58149103278
-
Use of MPEG-21 for Security and Authentication in Biomedical Sensor Networks
-
Sliema, Malta, October 26
-
W. Leister, T. Fretland and I. Balasingham, "Use of MPEG-21 for Security and Authentication in Biomedical Sensor Networks," 3rd International Conference on Systems and Networks Communications (ICSNC) 2008, Sliema, Malta, October 26, 2008.
-
(2008)
3rd International Conference on Systems and Networks Communications (ICSNC) 2008
-
-
Leister, W.1
Fretland, T.2
Balasingham, I.3
-
27
-
-
49149115890
-
Threat Assessment of Wireless Patient Monitoring Systems
-
Damascus, Syria, 7-11 April 08
-
W. Leister, H. Abie, A.-K. Groven, T. Fretland and I. Balasingham, "Threat Assessment of Wireless Patient Monitoring Systems," International Conference on Information and Communication Technologies (ICTTA) 2008, Damascus, Syria, 7-11 April 08, 2008.
-
(2008)
International Conference on Information and Communication Technologies (ICTTA) 2008
-
-
Leister, W.1
Abie, H.2
Groven, A.-K.3
Fretland, T.4
Balasingham, I.5
-
28
-
-
33847344453
-
Integrating Security, Mobility, and Multi-Homing in a HIP Way
-
P. Nikander, J. Ylitalo and J. Wall, "Integrating Security, Mobility, and Multi-Homing in a HIP Way," 10th Annual Network and Distributed System Security Symposium, 2003.
-
(2003)
10th Annual Network and Distributed System Security Symposium
-
-
Nikander, P.1
Ylitalo, J.2
Wall, J.3
-
31
-
-
0035149763
-
Usability and Security - An Appraisal of Usability Issues in Information Security Methods
-
oct
-
E. E. Schultz, R. W. Proctor, M.-C. Lien and G. Salvendy, "Usability and Security - An Appraisal of Usability Issues in Information Security Methods," Computer Security, Vol. 20, No. 7, Oct. 2001, 620-634.
-
(2001)
Computer Security
, vol.20
, Issue.7
, pp. 620-634
-
-
Schultz, E.E.1
Proctor, R.W.2
Lien, M.-C.3
Salvendy, G.4
-
32
-
-
0032626827
-
Attitudes, Satisfaction and Usage: Factors Contributing to Each in the Acceptance of Information Technology
-
S. S. Al-Ghatani and M. King, "Attitudes, Satisfaction and Usage: Factors Contributing to Each in the Acceptance of Information Technology," Behaviour and Information Technology, 19, 277-297.
-
Behaviour and Information Technology
, vol.19
, pp. 277-297
-
-
Al-Ghatani, S.S.1
King, M.2
-
34
-
-
33746905298
-
-
IEEE Std., 1061-1998, Revision, IEEE Standards Dept., Piscataway, N.J
-
IEEE Std. 1061-1998, "Standard for a Software Quality Metrics Methodology," Revision, IEEE Standards Dept., Piscataway, N.J., 1998.
-
(1998)
Standard for a Software Quality Metrics Methodology
-
-
-
35
-
-
49149101267
-
Holistic Estimation of Security, Privacy and Trust in Mobile Ad Hoc Networks
-
Damascus, Syria
-
R. Savola, "Holistic Estimation of Security, Privacy and Trust in Mobile Ad Hoc Networks," Int. Conf. on Information and Communication Technologies (ICTTA) 2008, Damascus, Syria, 6 p.
-
(2008)
Int. Conf. on Information and Communication Technologies (ICTTA)
, pp. 6
-
-
Savola, R.1
-
37
-
-
0346052082
-
Towards a Framework for Security Measurement
-
Baltimore, MD
-
C. Wang and W.A Wulf, "Towards a Framework for Security Measurement," 20th National Information Systems Security Conference, Baltimore, MD, 1997, 522-533.
-
(1997)
20th National Information Systems Security Conference
, pp. 522-533
-
-
Wang, C.1
Wulf, W.A.2
-
38
-
-
58049163339
-
Attack Scenarios Reconstruction and Paths of Packets Transfer Identification in Multihop Wireless Systems
-
Tangier, Morrocco
-
S. Rekhis and N. Boudriga, "Attack Scenarios Reconstruction and Paths of Packets Transfer Identification in Multihop Wireless Systems," New Technologies, Mobility and Security (NTMS) 2008, Workshop on Security of Wireless Communication Systems (SWCS'08, in conjunction NTMS 2008), Tangier, Morrocco, 2008.
-
(2008)
New Technologies, Mobility and Security (NTMS) 2008, Workshop on Security of Wireless Communication Systems (SWCS'08, in conjunction NTMS 2008)
-
-
Rekhis, S.1
Boudriga, N.2
-
40
-
-
58149203602
-
GEMOM - Significant and Measurable Progress Beyond the State of the Art
-
Sliema, Malta
-
H. Abie, I. Dattani, M. Novkovic, J. Bigham, S. Topham, R. Savola, "GEMOM - Significant and Measurable Progress Beyond the State of the Art," 3rd Int. Conf. on Systems and Networks Communications (ICSNC) 2008, Sliema, Malta, 2008, 191-196.
-
(2008)
3rd Int. Conf. on Systems and Networks Communications (ICSNC) 2008
, pp. 191-196
-
-
Abie, H.1
Dattani, I.2
Novkovic, M.3
Bigham, J.4
Topham, S.5
Savola, R.6
-
41
-
-
34548185933
-
Towards Security Evaluation based on Evidence Information Collection and Impact Analysis
-
Philadelphia, PA
-
R. Savola and J. Röning, "Towards Security Evaluation based on Evidence Information Collection and Impact Analysis," Supplemental Proceedings of the Int. Conf. on Dependable Systems and Networks (DSN), Workshop on Empirical Evaluation of Dependability and Security (WEEDS) 2006, Philadelphia, PA, 113-118.
-
Supplemental Proceedings of the Int. Conf. on Dependable Systems and Networks (DSN), Workshop on Empirical Evaluation of Dependability and Security (WEEDS) 2006
, pp. 113-118
-
-
Savola, R.1
Röning, J.2
-
42
-
-
84892902868
-
A Pattern System for Access Control
-
Sitges, Spain
-
T. Priebe, E. B. Fernandez, J. I. Mehlau and G. Pernul, "A Pattern System for Access Control," 18th Annual IFIP WG 11.3 Conf. on Data and Applications Security, Sitges, Spain, 2004, 235-249.
-
(2004)
18th Annual IFIP WG 11.3 Conf. on Data and Applications Security
, pp. 235-249
-
-
Priebe, T.1
Fernandez, E.B.2
Mehlau, J.I.3
Pernul, G.4
-
43
-
-
36048973545
-
Requirement Centric Security Evaluation of Software Intensive Systems
-
Szklarska Poreba, Poland
-
R. Savola, "Requirement Centric Security Evaluation of Software Intensive Systems," 2nd Int. Conf. on Dependability of Computer Systems (DepCOS- RELCOMEX) Szklarska Poreba, Poland, 2007, 132-142.
-
(2007)
2nd Int. Conf. on Dependability of Computer Systems (DepCOS- RELCOMEX)
, pp. 132-142
-
-
Savola, R.1
-
45
-
-
84950162203
-
Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks
-
O. Kachirski and R. Guha, "Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks," IEEE Workshop on Knowledge Media Networks, 2002, 153-158.
-
(2002)
IEEE Workshop on Knowledge Media Networks
, pp. 153-158
-
-
Kachirski, O.1
Guha, R.2
-
47
-
-
49049102759
-
Using Security Patterns to Combine Security Metrics
-
T. Heyman, R. Scandariato, C. Huygens, W. Joosen, "Using Security Patterns to Combine Security Metrics," 3rd Int. Conf. on Availability, Reliability and Security (ARES) 2008, 1156-1163.
-
(2008)
3rd Int. Conf. on Availability, Reliability and Security (ARES)
, pp. 1156-1163
-
-
Heyman, T.1
Scandariato, R.2
Huygens, C.3
Joosen, W.4
|