-
3
-
-
57349136732
-
Evaluating the cost reduction of static code analysis for software security
-
Baca, D., Carlsson, B., Lundberg, L.: Evaluating the cost reduction of static code analysis for software security. In: Proceedings of the International Workshop on Programming Languages and Analysis for Security (PLAS 2008), pp. 79-88 (2008)
-
(2008)
Proceedings of the International Workshop on Programming Languages and Analysis for Security (PLAS 2008)
, pp. 79-88
-
-
Baca, D.1
Carlsson, B.2
Lundberg, L.3
-
4
-
-
70349667605
-
Static code analysis to detect software security vulnerabilities - Does experience matter?
-
Baca, D., Petersen, K., Carlsson, B., Lundberg, L.: Static code analysis to detect software security vulnerabilities - does experience matter? In: Proceedings of the The 4th International Conference on Availability, Reliability and Security (ARES 2009), pp. 804-810 (2009)
-
(2009)
Proceedings of the the 4th International Conference on Availability, Reliability and Security (ARES 2009)
, pp. 804-810
-
-
Baca, D.1
Petersen, K.2
Carlsson, B.3
Lundberg, L.4
-
6
-
-
84885793990
-
Rational choice of security measures via multi-parameter attack trees
-
López, J. (ed.) CRITIS 2006. Springer, Heidelberg
-
Buldas, A., Laud, P., Priisalu, J., Saarepera, M., Willemson, J.: Rational choice of security measures via multi-parameter attack trees. In: López, J. (ed.) CRITIS 2006. LNCS, vol. 4347, pp. 235-248. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4347
, pp. 235-248
-
-
Buldas, A.1
Laud, P.2
Priisalu, J.3
Saarepera, M.4
Willemson, J.5
-
7
-
-
0038226150
-
-
Technical Report Technical Report CMU/SEI-2001-TN-001, Software Engineering Institute
-
Moore, A.P., Ellison, R.J., Linger, R.C.: Attack modeling for information security and survivability. Technical Report Technical Report CMU/SEI-2001-TN-001, Software Engineering Institute (2001)
-
(2001)
Attack Modeling for Information Security and Survivability
-
-
Moore, A.P.1
Ellison, R.J.2
Linger, R.C.3
-
8
-
-
33745849657
-
Foundations of attack trees
-
Won, D.H., Kim, S. (eds.) ICISC 2005. Springer, Heidelberg
-
Mauw, S., Oostdijk, M.: Foundations of attack trees. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 186-198. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3935
, pp. 186-198
-
-
Mauw, S.1
Oostdijk, M.2
-
9
-
-
33646067113
-
Faults-slip-through - A concept for measuring the efficiency of the test process
-
Damm, L.O., Lundberg, L., Wohlin, C.: Faults-slip-through - a concept for measuring the efficiency of the test process. Software Process: Improvement and Practice 11(1), 47-59 (2006)
-
(2006)
Software Process: Improvement and Practice
, vol.11
, Issue.1
, pp. 47-59
-
-
Damm, L.O.1
Lundberg, L.2
Wohlin, C.3
-
11
-
-
0002670359
-
Attack trees
-
Schneier, B.: Attack trees. Dr. Dobb's Journal 24(12), 21-29 (1999)
-
(1999)
Dr. Dobb's Journal
, vol.24
, Issue.12
, pp. 21-29
-
-
Schneier, B.1
-
13
-
-
70849136924
-
Threat modeling using attack trees
-
Saini, V., Duan, Q., Paruchuri, V.: Threat modeling using attack trees. J. Comput. Small Coll. 23(4), 124-131 (2008)
-
(2008)
J. Comput. Small Coll.
, vol.23
, Issue.4
, pp. 124-131
-
-
Saini, V.1
Duan, Q.2
Paruchuri, V.3
-
16
-
-
62849086118
-
Evaluating two ways of calculating priorities in requirements hierarchies - An experiment on hierarchical cumulative voting
-
Berander, P., Svahnberg, M.: Evaluating two ways of calculating priorities in requirements hierarchies - an experiment on hierarchical cumulative voting. Journal of Systems and Software 82(5), 836-850 (2009)
-
(2009)
Journal of Systems and Software
, vol.82
, Issue.5
, pp. 836-850
-
-
Berander, P.1
Svahnberg, M.2
|