메뉴 건너뛰기




Volumn 6156 LNCS, Issue , 2010, Pages 176-190

Prioritizing countermeasures through the countermeasure method for software security (CM-Sec)

Author keywords

[No Author keywords available]

Indexed keywords

ATTACK TREE; COST-EFFICIENCY; END-PRODUCTS; NOVEL METHODS; OPEN-SOURCE; PRIORITIZATION; QUALITY ASPECTS; SOFTWARE SECURITY; SOFTWARE SYSTEMS; THREATS AND ATTACKS;

EID: 77955439747     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-13792-1_15     Document Type: Conference Paper
Times cited : (18)

References (16)
  • 6
    • 84885793990 scopus 로고    scopus 로고
    • Rational choice of security measures via multi-parameter attack trees
    • López, J. (ed.) CRITIS 2006. Springer, Heidelberg
    • Buldas, A., Laud, P., Priisalu, J., Saarepera, M., Willemson, J.: Rational choice of security measures via multi-parameter attack trees. In: López, J. (ed.) CRITIS 2006. LNCS, vol. 4347, pp. 235-248. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4347 , pp. 235-248
    • Buldas, A.1    Laud, P.2    Priisalu, J.3    Saarepera, M.4    Willemson, J.5
  • 8
    • 33745849657 scopus 로고    scopus 로고
    • Foundations of attack trees
    • Won, D.H., Kim, S. (eds.) ICISC 2005. Springer, Heidelberg
    • Mauw, S., Oostdijk, M.: Foundations of attack trees. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 186-198. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3935 , pp. 186-198
    • Mauw, S.1    Oostdijk, M.2
  • 9
    • 33646067113 scopus 로고    scopus 로고
    • Faults-slip-through - A concept for measuring the efficiency of the test process
    • Damm, L.O., Lundberg, L., Wohlin, C.: Faults-slip-through - a concept for measuring the efficiency of the test process. Software Process: Improvement and Practice 11(1), 47-59 (2006)
    • (2006) Software Process: Improvement and Practice , vol.11 , Issue.1 , pp. 47-59
    • Damm, L.O.1    Lundberg, L.2    Wohlin, C.3
  • 11
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees
    • Schneier, B.: Attack trees. Dr. Dobb's Journal 24(12), 21-29 (1999)
    • (1999) Dr. Dobb's Journal , vol.24 , Issue.12 , pp. 21-29
    • Schneier, B.1
  • 16
    • 62849086118 scopus 로고    scopus 로고
    • Evaluating two ways of calculating priorities in requirements hierarchies - An experiment on hierarchical cumulative voting
    • Berander, P., Svahnberg, M.: Evaluating two ways of calculating priorities in requirements hierarchies - an experiment on hierarchical cumulative voting. Journal of Systems and Software 82(5), 836-850 (2009)
    • (2009) Journal of Systems and Software , vol.82 , Issue.5 , pp. 836-850
    • Berander, P.1    Svahnberg, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.