-
2
-
-
77956063194
-
-
Swedish Defence Research Agency
-
Bengtsson, J., Hallberg, J., Hunstad, A., Lundholm, K., 2009. Tests of methods for information security assessment. Tech. Re FOI-R-2901-SE. Swedish Defence Research Agency.
-
(2009)
Tests of Methods for Information Security Assessment. Tech. Re FOI-R-2901-SE
-
-
Bengtsson, J.1
Hallberg, J.2
Hunstad, A.3
Lundholm, K.4
-
4
-
-
0026374073
-
Bayesian networks without tears: Making Bayesian networks more accessible to the probabilistically unsophisticated
-
E. Charniak Bayesian networks without tears: making Bayesian networks more accessible to the probabilistically unsophisticated AI Magazine 12 4 1991 50 63
-
(1991)
AI Magazine
, vol.12
, Issue.4
, pp. 50-63
-
-
Charniak, E.1
-
5
-
-
77950539756
-
Structured semantics for the CORAS security risk modelling language
-
Dahl, H.E.I., Hogganvik, I., Stølen, K., 2007. Structured semantics for the CORAS security risk modelling language. Tech. Rep. A970. SINTEF ICT.
-
(2007)
Tech. Rep. A970. SINTEF ICT
-
-
Dahl, H.E.I.1
-
6
-
-
77956063854
-
Vulnerability of the nordic power system
-
Doorman, G., Kjølle, G., Uhlen, K., Huse, E.S., Flatbø, N., 2004. Vulnerability of the nordic power system. Tech. Rep. A5962. SINTEF Energy Research.
-
(2004)
Tech. Rep. A5962. SINTEF Energy Research
-
-
Doorman, G.1
-
7
-
-
4544355067
-
-
Cambridge Studies in Advanced Mathematics Cambridge
-
R.M. Dudley Real Analysis and Probability 2002 Cambridge Studies in Advanced Mathematics Cambridge ISBN 0-521-00754-2
-
(2002)
Real Analysis and Probability
-
-
Dudley, R.M.1
-
8
-
-
38049134178
-
Combining evidence in risk analysis using Bayesian networks
-
Agena.
-
Fenton, N., Neil, M., 2004. Combining evidence in risk analysis using Bayesian networks. Agena White Paper W0704/01. Agena.
-
(2004)
Agena White Paper W0704/01
-
-
Fenton, N.1
Neil, M.2
-
9
-
-
0036642013
-
Software measurement: Uncertainty and causal modeling
-
N.E. Fenton, P. Krause, and M. Neil Software measurement: uncertainty and causal modeling IEEE Software 19 4 2002 116 122
-
(2002)
IEEE Software
, vol.19
, Issue.4
, pp. 116-122
-
-
Fenton, N.E.1
Krause, P.2
Neil, M.3
-
11
-
-
33750988493
-
Component-based hazard analysis: Optimal designs, product lines, and online-reconfiguration
-
Springer
-
H. Giese, and M. Tichy Component-based hazard analysis: optimal designs, product lines, and online-reconfiguration Proceedings of the 25th International Conference on Computer Safety, Security and Reliability (SAFECOMP'06), vol. 4166 of LNCS 2006 Springer
-
(2006)
Proceedings of the 25th International Conference on Computer Safety, Security and Reliability (SAFECOMP'06), Vol. 4166 of LNCS
-
-
Giese, H.1
Tichy, M.2
-
14
-
-
84945708698
-
An axiomatic basis for computer programming
-
C.A.R. Hoare An axiomatic basis for computer programming Communications of the ACM 12 10 1969 576 580
-
(1969)
Communications of the ACM
, vol.12
, Issue.10
, pp. 576-580
-
-
Hoare, C.A.R.1
-
15
-
-
70349171034
-
-
Ph.D. Thesis. Faculty of Mathematics and Natural Sciences, University of Oslo
-
Hogganvik, I., 2007. A graphical approach to security risk analysis. Ph.D. Thesis. Faculty of Mathematics and Natural Sciences, University of Oslo.
-
(2007)
A Graphical Approach to Security Risk Analysis
-
-
Hogganvik, I.1
-
23
-
-
0020929268
-
Specification and design of (parallel) programs
-
C.B. Jones Specification and design of (parallel) programs IFIP Congress 1983
-
(1983)
IFIP Congress
-
-
Jones, C.B.1
-
27
-
-
84945713135
-
Applying "design by contract"
-
B. Meyer Applying "design by contract" Computer 25 10 1992 40 51
-
(1992)
Computer
, vol.25
, Issue.10
, pp. 40-51
-
-
Meyer, B.1
-
31
-
-
0035283779
-
Analysis and synthesis of the behaviour of complex programmable electronic systems in conditions of failure
-
Y. Papadoupoulos, J. McDermid, R. Sasse, and G. Heiner Analysis and synthesis of the behaviour of complex programmable electronic systems in conditions of failure Reliability Engineering and System Safety 71 3 2001 229 247
-
(2001)
Reliability Engineering and System Safety
, vol.71
, Issue.3
, pp. 229-247
-
-
Papadoupoulos, Y.1
McDermid, J.2
Sasse, R.3
Heiner, G.4
-
35
-
-
77956063553
-
-
5th ed. R2A
-
Robinson, R.M., Anderson, K., Browning, B., Francis, G., Kanga, M., Millen, T., Tillman, C., 2001. Risk and Reliability. An Introductory Text, 5th ed. R2A.
-
(2001)
Risk and Reliability. An Introductory Text
-
-
Robinson, R.M.1
Anderson, K.2
Browning, B.3
Francis, G.4
Kanga, M.5
Millen, T.6
Tillman, C.7
-
36
-
-
0002670359
-
Attack trees: Modeling security threats
-
B. Schneier Attack trees: modeling security threats Dr. Dobb's Journal of Software Tools 24 12 1999 21 29
-
(1999)
Dr. Dobb's Journal of Software Tools
, vol.24
, Issue.12
, pp. 21-29
-
-
Schneier, B.1
|