-
3
-
-
85015112928
-
Security modelling for organisations
-
Fairfax, Virginia, United States
-
Anderson A, Longley D, Kwok LF. Security modelling for organisations. In: Proceedings of the 2nd ACM conference on computer and communications security. Fairfax, Virginia, United States; 1994. p. 241-50.
-
(1994)
Proceedings of the 2nd ACM Conference on Computer and Communications Security
, pp. 241-250
-
-
Anderson, A.1
Longley, D.2
Kwok, L.F.3
-
4
-
-
33750958509
-
Defense trees for economic evaluation of security investments
-
Vienna, Austria
-
Bistarelli S, Fioravanti F, Peretti P. Defense trees for economic evaluation of security investments. In: Proceedings of the international conference on availability, reliability and security, Vienna, Austria; 2006. p. 416-23.
-
(2006)
Proceedings of the International Conference on Availability, Reliability and Security
, pp. 416-423
-
-
Bistarelli, S.1
Fioravanti, F.2
Peretti, P.3
-
7
-
-
3142750497
-
Tropos: An agent-oriented software development
-
P. Bresciani, A. Perini, P. Giorgini, F. Giunchiglia, and J. Mylopoulos Tropos: an agent-oriented software development Autonomous Agents and Multi-Agent Systems 8 2004 203 236
-
(2004)
Autonomous Agents and Multi-Agent Systems
, vol.8
, pp. 203-236
-
-
Bresciani, P.1
Perini, A.2
Giorgini, P.3
Giunchiglia, F.4
Mylopoulos, J.5
-
8
-
-
5844427027
-
A methodology for describing information and physical security architectures
-
Singapore
-
Caelli WJ, Longley D, Tickle AB. A methodology for describing information and physical security architectures. In: Proceedings of the IFIP TC11, eighth international conference on information security, Singapore, vol. A-15; 1992. p. 277-96.
-
(1992)
Proceedings of the IFIP TC11, Eighth International Conference on Information Security
, vol.A-15
, pp. 277-296
-
-
Caelli, W.J.1
Longley, D.2
Tickle, A.B.3
-
10
-
-
67649880549
-
A tool for enterprise architecture analysis of maintainability
-
Washington, DC, USA
-
Ekstedt M, Franke U, Johnson P, Lagerström R, Sommestad T, Ullberg J, et al. A tool for enterprise architecture analysis of maintainability. In: Proceedings of the 2009 european conference on software maintenance and reengineering, Washington, DC, USA; 2009. p. 327-28.
-
(2009)
Proceedings of the 2009 European Conference on Software Maintenance and Reengineering
, pp. 327-328
-
-
Ekstedt, M.F.1
-
12
-
-
27644537252
-
Modeling security requirements through ownership, permission and delegation
-
Paris, France
-
Giorgini P, Massacci F, Mylopoulos J, Zannone N. Modeling security requirements through ownership, permission and delegation. In: 13th IEEE international conference on requirements engineering, Paris, France; 2005. p. 167-76.
-
(2005)
13th IEEE International Conference on Requirements Engineering
, pp. 167-176
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
14
-
-
70349171034
-
-
University of Oslo - Faculty of Mathematics and Natural Sciences Oslo, Norway
-
I. Hogganvik A graphical approach to security risk analysis 2007 University of Oslo - Faculty of Mathematics and Natural Sciences Oslo, Norway
-
(2007)
A Graphical Approach to Security Risk Analysis
-
-
Hogganvik, I.1
-
17
-
-
77955415271
-
Cost benefit analysis for network intrusion detection systems
-
Washington, DC
-
Huaqiang W, Deb F, Olivia C, Chris R. Cost benefit analysis for network intrusion detection systems. In: CSI 28th annual computer security conference, Washington, DC; 2001.
-
(2001)
CSI 28th Annual Computer Security Conference
-
-
Huaqiang, W.1
Deb, F.2
Olivia, C.3
Chris, R.4
-
18
-
-
2342646110
-
The effect of intrusion detection management methods on the return on investment
-
C. Iheagwara The effect of intrusion detection management methods on the return on investment Computers and Security 23 2004 213 228
-
(2004)
Computers and Security
, vol.23
, pp. 213-228
-
-
Iheagwara, C.1
-
21
-
-
20444498659
-
Topological analysis of network attack vulnerability
-
S. Jajodia, S. Noel, and B. O'Berry Topological analysis of network attack vulnerability [Chapter 5] V. Kumar, J. Srivastava, A. Lazarevic, Managing cyber threats: issues, approaches and challanges 2003 Kluwer Academic Publisher 247 266 Springer US
-
(2003)
Managing Cyber Threats: Issues, Approaches and Challanges
, pp. 247-266
-
-
Jajodia, S.1
Noel, S.2
O'Berry, B.3
-
26
-
-
17844381878
-
ISRAM: Information security risk analysis method
-
B. Karabacak, and I. Sogukpinar ISRAM: information security risk analysis method Computers and Security 24 2005 147 159
-
(2005)
Computers and Security
, vol.24
, pp. 147-159
-
-
Karabacak, B.1
Sogukpinar, I.2
-
27
-
-
27544491841
-
Network vulnerability assessment using Bayesian networks
-
Orlando, Florida, USA
-
Liu Y, Hong M. Network vulnerability assessment using Bayesian networks. In: Proceedings of SPIE. Orlando, Florida, USA; 2005. p. 61-71.
-
(2005)
Proceedings of SPIE
, pp. 61-71
-
-
Liu, Y.1
Hong, M.2
-
32
-
-
77955423252
-
-
Object Management Group (OMG). OMG systems modeling language (OMG SysML)
-
Object Management Group (OMG). OMG systems modeling language (OMG SysML); 2008.
-
(2008)
-
-
-
36
-
-
33751072193
-
Risk analysis and assessment
-
4th ed Auerbach Boca Raton, USA
-
W. Ozier Risk analysis and assessment Information security management handbook 4th ed 1999 Auerbach Boca Raton, USA 247 285
-
(1999)
Information Security Management Handbook
, pp. 247-285
-
-
Ozier, W.1
-
37
-
-
34547454437
-
A weakest-adversary security metric for network configuration security analysis
-
Pamula P, Ammann P, Jajodia A, Swarup V. A weakest-adversary security metric for network configuration security analysis. In: Conference on computer and communications security, Proceedings of the 2nd ACM workshop on Quality of protection; 2006. p. 31-38.
-
(2006)
Conference on Computer and Communications Security, Proceedings of the 2nd ACM Workshop on Quality of Protection
, pp. 31-38
-
-
Pamula, P.1
Ammann, P.2
Jajodia, A.3
Swarup, V.4
-
40
-
-
33751084118
-
Expected benefits of information security investments
-
J.J.C.H. Ryan, and D.J. Ryan Expected benefits of information security investments Computers and Security 25 2006 579 588
-
(2006)
Computers and Security
, vol.25
, pp. 579-588
-
-
Ryan, J.J.C.H.1
Ryan, D.J.2
-
42
-
-
0002670359
-
Attack trees: Modeling security threats
-
B. Schneier Attack trees: modeling security threats Dr. Dobb's Journal December, 1999
-
(1999)
Dr. Dobb's Journal
-
-
Schneier, B.1
-
43
-
-
0032299248
-
Time-based security explained: Provable security models and formulas for the practitioner and vendor
-
W. Schwartau Time-based security explained: provable security models and formulas for the practitioner and vendor Computers and Security 17 1998 693 714
-
(1998)
Computers and Security
, vol.17
, pp. 693-714
-
-
Schwartau, W.1
-
44
-
-
0022818911
-
Evaluating influence diagrams
-
R. Shachter Evaluating influence diagrams Operations Research 34 1986 871 882
-
(1986)
Operations Research
, vol.34
, pp. 871-882
-
-
Shachter, R.1
-
45
-
-
35048885033
-
Tools for generating and analyzing attack graphs
-
Springer Berlin/Heidelberg
-
O. Sheyner, and J. Wing Tools for generating and analyzing attack graphs Formal methods for components and objects 2004 Springer Berlin/Heidelberg 344 371
-
(2004)
Formal Methods for Components and Objects
, pp. 344-371
-
-
Sheyner, O.1
Wing, J.2
-
47
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
G. Sindre, and A.L. Opdahl Eliciting security requirements with misuse cases Requirements Engineering 10 2005 34 44
-
(2005)
Requirements Engineering
, vol.10
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
50
-
-
84964504906
-
Computer-attack graph generation tool
-
Proceedings
-
Swiler LP, Phillips C, Ellis D, Chakerian S. Computer-attack graph generation tool. In: DARPA Information Survivability Conference & Exposition II. DISCEX '01. Proceedings, vol. 2; 2001. p. 307-21.
-
(2001)
DARPA Information Survivability Conference & Exposition II. DISCEX '01
, vol.2
, pp. 307-321
-
-
Swiler, L.P.1
Phillips, C.2
Ellis, D.3
Chakerian, S.4
-
51
-
-
2642540118
-
Modeling internet attacks
-
West Point, NY, USA
-
Tidwel T, Larson R, Fitch K, Hale J. Modeling internet attacks. In: IEEE workshop on information assurance and security, West Point, NY, USA; 2001. p. 54-9.
-
(2001)
IEEE Workshop on Information Assurance and Security
, pp. 54-59
-
-
Tidwel, T.1
Larson, R.2
Fitch, K.3
Hale, J.4
-
52
-
-
77955420332
-
-
Toulouse, France Avaliable at
-
K.M. Trevisani, R.E. Garcia, SPML: a visual approach for modeling firewall configurations, in Modeling security workshop, Toulouse, France, 2008. Avaliable at: http://www.comp.lancs.ac.uk/modsec/papers/modsec08-submission-21. pdf
-
(2008)
SPML: A Visual Approach for Modeling Firewall Configurations, in Modeling Security Workshop
-
-
Trevisani, K.M.1
Garcia, R.E.2
-
53
-
-
17844396492
-
The economic approach of information security
-
T. Tsiakis, and G. Stephanides The economic approach of information security Computers and Security 24 2005 105 108
-
(2005)
Computers and Security
, vol.24
, pp. 105-108
-
-
Tsiakis, T.1
Stephanides, G.2
|