-
1
-
-
17744386105
-
From System Goals to Intruder Anti-Goals: Attack Generation and Resolution for Security Requirements Engineering
-
A. Van Lamsweerde, S. Brohez, R. De Landtsheer, D. Janssens, "From System Goals to Intruder Anti-Goals: Attack Generation and Resolution for Security Requirements Engineering", in Proceedings of the Requirements for High Assurance Workshop, Monterey Bay, CA, September 8, 2003, 49-56.
-
Proceedings of the Requirements for High Assurance Workshop, Monterey Bay, CA, September 8, 2003
, pp. 49-56
-
-
Van Lamsweerde, A.1
Brohez, S.2
De Landtsheer, R.3
Janssens, D.4
-
2
-
-
34249004734
-
Secure Tropos: A security oriented extension of the Tropos methodology
-
H. Mouratidis and P. Giorgini, "Secure Tropos: A security oriented extension of the Tropos methodology", IJSEKE Vol 17, n.2, 2007
-
(2007)
IJSEKE
, vol.17
, Issue.2
-
-
Mouratidis, H.1
Giorgini, P.2
-
5
-
-
12244283592
-
Security Metrics Guide for Information Technology Systems
-
M. Swanson, B. Nadya, J. Sabato, J. Hash and L. Graffo, "Security Metrics Guide for Information Technology Systems", National Institute of Standards and technology Special publication #800-55
-
National Institute of Standards and Technology Special publication #800-55
-
-
Swanson, M.1
Nadya, B.2
Sabato, J.3
Hash, J.4
Graffo, L.5
-
7
-
-
33745435096
-
Current Trends and Advances in Information Assurance Metrics
-
N. Seddigh, P. Pieda, A. Matrawy, B. Nandy, L. Lambadaris and A. Hatfield, "Current Trends and Advances in Information Assurance Metrics" In proceedings of PST 2004: 197-205
-
Proceedings of PST 2004
, pp. 197-205
-
-
Seddigh, N.1
Pieda, P.2
Matrawy, A.3
Nandy, B.4
Lambadaris, L.5
Hatfield, A.6
-
9
-
-
77954820255
-
Multi-Agent based security assurance monitoring system for telecommunication infrastructures
-
E.Bulut, D. Khadraoui and B. Marquet, "Multi-Agent based security assurance monitoring system for telecommunication infrastructures", in proceedings to the Communication, Network, and Information Security conference, Berkely/California.
-
Proceedings to the Communication, Network, and Information Security Conference, Berkely/California
-
-
Bulut, E.1
Khadraoui, D.2
Marquet, B.3
-
14
-
-
11144347895
-
-
Addison-Wesley, Boston, Massachusetts, USA, June
-
T.J. Klevinsky, S. Laliberte, A. Gupta, " Hack I.T. - Security Through Penetration Testing", Addison-Wesley, Boston, Massachusetts, USA, June 2002
-
(2002)
Hack I.T. - Security Through Penetration Testing
-
-
Klevinsky, T.J.1
Laliberte, S.2
Gupta, A.3
-
16
-
-
77954594855
-
A probe capability metric taxonomy for assurance evaluation
-
M. Ouedraogo, H. Mouratidis, D. Khadraoui and E. Dubois, "A probe capability metric taxonomy for assurance evaluation", In proceedings of UEL 5th conference on Advances in Computing and Technology Conference (AC&T), England, 2010
-
Proceedings of UEL 5th Conference on Advances in Computing and Technology Conference (AC&T), England, 2010
-
-
Ouedraogo, M.1
Mouratidis, H.2
Khadraoui, D.3
Dubois, E.4
-
18
-
-
35048870670
-
Multi-agent Systems and Security Requirements Analysis
-
Advances in Software Engineering for Multi-Agent Systems, C. Lucena, A. Garcia, A. Romanovsky, J. Castro, and P. Alencar (editors), Springer-Verlag
-
P. Bresciani, P. Giorgini, H. Mouratidis, G. Manson, " Multi-agent Systems and Security Requirements Analysis", in Advances in Software Engineering for Multi-Agent Systems, C. Lucena, A. Garcia, A. Romanovsky, J. Castro, and P. Alencar (editors), Lecture Notes in Artificial Intelligence 2940, Springer-Verlag
-
Lecture Notes in Artificial Intelligence
, vol.2940
-
-
Bresciani, P.1
Giorgini, P.2
Mouratidis, H.3
Manson, G.4
-
19
-
-
0003944811
-
-
Ph.D. Thesis, Department of Computer Science, University of Toronto, Canada
-
E. Yu, "Modeling Strategic Relationships for process Reengineering", Ph.D. Thesis, Department of Computer Science, University of Toronto, Canada,1998.
-
(1998)
Modeling Strategic Relationships for Process Reengineering
-
-
Yu, E.1
-
22
-
-
77954828041
-
-
Accessed: 10 March 2008
-
JADE, http://jade.tilab.com [Accessed: 10 March 2008]
-
-
-
-
23
-
-
3042617182
-
A Quantitative Study of Firewall Configuration Errors
-
June
-
A. Wool, "A Quantitative Study of Firewall Configuration Errors" Computer, vol. 37, no. 6, pp. 62-67, June 2004.
-
(2004)
Computer
, vol.37
, Issue.6
, pp. 62-67
-
-
Wool, A.1
-
24
-
-
77954831248
-
-
Samhain, http://www.la-samhain.de/samhain.
-
-
-
|