-
3
-
-
33646902682
-
Special systems: Overlooked sources of security risk?
-
E. E. Schultz, "Special systems: Overlooked sources of security risk?" Computers & Security, vol. 25, no. 3, p. 155, 2006.
-
(2006)
Computers & Security
, vol.25
, Issue.3
, pp. 155
-
-
Schultz, E.E.1
-
4
-
-
0942298614
-
Decision analysis of statistically detecting distributed denial-of-service flooding attacks
-
M. Li, C.-H. Chi, weijia Jia, W. Zhao, W. Zhao, J. Cao, D. Long, and Q. Meng, "Decision analysis of statistically detecting distributed denial-of-service flooding attacks," Journal of Information Technology & Decision Making, vol. 2, no. 3, pp. 397-405, 2003.
-
(2003)
Journal of Information Technology & Decision Making
, vol.2
, Issue.3
, pp. 397-405
-
-
Li, M.1
Chi, C.-H.2
Jia, W.3
Zhao, W.4
Zhao, W.5
Cao, J.6
Long, D.7
Meng, Q.8
-
6
-
-
33947219926
-
Information security models and metrics
-
New York, NY, USA: ACM
-
A. J. A. Wang, "Information security models and metrics," in ACM-SE 43: Proceedings of the 43rd annual Southeast regional conference. New York, NY, USA: ACM, 2005, pp. 178-184.
-
(2005)
ACM-SE 43: Proceedings of the 43rd Annual Southeast Regional Conference
, pp. 178-184
-
-
Wang, A.J.A.1
-
7
-
-
77952754188
-
A new information security model based on network service protection
-
Washington, DC, USA: IEEE Computer Society
-
W. Li, D. Wu, and H. Lu, "A new information security model based on network service protection," in ICISE '09: Proceedings of the 2009 First IEEE International Conference on Information Science and Engineering. Washington, DC, USA: IEEE Computer Society, 2009, pp. 1547-1549.
-
(2009)
ICISE '09: Proceedings of the 2009 First IEEE International Conference on Information Science and Engineering
, pp. 1547-1549
-
-
Li, W.1
Wu, D.2
Lu, H.3
-
8
-
-
34248348339
-
Measuring, analyzing and predicting security vulnerabilities in software systems
-
May
-
O. H. Alhazmi, Y. K. Malaiya, and I. Ray, "Measuring, analyzing and predicting security vulnerabilities in software systems," Computers & Security, vol. 26, no. 3, pp. 219-228, May 2007.
-
(2007)
Computers & Security
, vol.26
, Issue.3
, pp. 219-228
-
-
Alhazmi, O.H.1
Malaiya, Y.K.2
Ray, I.3
-
9
-
-
33749041137
-
Belief-based risk analysis, in
-
Australia: Australian Computer Society, Inc.
-
A. Jøsang, D. Bradley, and S. J. Knapskog, "Belief-based risk analysis," in ACSW Frontiers '04: Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation. Darlinghurst, Australia, Australia: Australian Computer Society, Inc., 2004, pp. 63-68.
-
(2004)
ACSW Frontiers '04: Proceedings of the Second Workshop on Australasian Information Security, Data Mining and Web Intelligence, and Software Internationalisation. Darlinghurst, Australia
, pp. 63-68
-
-
Jøsang, A.1
Bradley, D.2
Knapskog, S.J.3
-
10
-
-
33846813917
-
Information lifecycle security risk assessment: A tool for closing security gaps
-
R. Bernard, "Information lifecycle security risk assessment: A tool for closing security gaps," Computers & Security, vol. 26, no. 1, pp. 26-30, 2007.
-
(2007)
Computers & Security
, vol.26
, Issue.1
, pp. 26-30
-
-
Bernard, R.1
-
11
-
-
33947726366
-
Parameterisation and evaluation of a bayesian network for use in an ecological risk assessment
-
C. A. Pollino, O. Woodberry, A. Nicholson, K. Korb, and B. T. Hart, "Parameterisation and evaluation of a bayesian network for use in an ecological risk assessment," Environ. Model. Softw., vol. 22, no. 8, pp. 1140-1152, 2007.
-
(2007)
Environ. Model. Softw.
, vol.22
, Issue.8
, pp. 1140-1152
-
-
Pollino, C.A.1
Woodberry, O.2
Nicholson, A.3
Korb, K.4
Hart, B.T.5
-
12
-
-
55349129266
-
A composite network security assessment
-
Washington, DC, USA: IEEE Computer Society
-
S. Kondakci, "A composite network security assessment," in IAS '08: Proceedings of the 2008 The Fourth International Conference on Information Assurance and Security. Washington, DC, USA: IEEE Computer Society, 2008, pp. 249-254.
-
(2008)
IAS '08: Proceedings of the 2008 the Fourth International Conference on Information Assurance and Security
, pp. 249-254
-
-
Kondakci, S.1
-
13
-
-
78649280792
-
Netgraph: An object-oriented graphical toolset for risk assessment
-
New York, NY, USA: ACM
-
S. Uckun, B. Dawant, and K. Kawamura, "Netgraph: an object-oriented graphical toolset for risk assessment," in IEA/AIE '89: Proceedings of the 2nd international conference on Industrial and engineering applications of artificial intelligence and expert systems. New York, NY, USA: ACM, 1989, pp. 119-125.
-
(1989)
IEA/AIE '89: Proceedings of the 2nd International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems
, pp. 119-125
-
-
Uckun, S.1
Dawant, B.2
Kawamura, K.3
-
14
-
-
35048893595
-
Results of classroom enterprise security assessment of five large enterprise networks
-
G. L. Wooley, "Results of classroom enterprise security assessment of five large enterprise networks," J. Comput. Small Coll., vol. 18, no. 3, pp. 185-195, 2003.
-
(2003)
J. Comput. Small Coll.
, vol.18
, Issue.3
, pp. 185-195
-
-
Wooley, G.L.1
-
15
-
-
34547462739
-
Towards a measuring framework for security properties of software
-
New York, NY, USA: ACM
-
R. Scandariato, B. D. Win, and W. Joosen, "Towards a measuring framework for security properties of software," in QoP '06: Proceedings of the 2nd ACM workshop on Quality of protection. New York, NY, USA: ACM, 2006, pp. 27-30.
-
(2006)
QoP '06: Proceedings of the 2nd ACM Workshop on Quality of Protection
, pp. 27-30
-
-
Scandariato, R.1
Win, B.D.2
Joosen, W.3
-
16
-
-
34447521494
-
Vulnerability take grant (vtg): An efficient approach to analyze network vulnerabilities
-
August
-
H. R. Shahriar and R. Jalili, "Vulnerability take grant (vtg): An efficient approach to analyze network vulnerabilities," Computers & Security, vol. 26, pp. 349-360, August 2007.
-
(2007)
Computers & Security
, vol.26
, pp. 349-360
-
-
Shahriar, H.R.1
Jalili, R.2
-
18
-
-
0003625523
-
-
USD, NJ 07458, USA: Prentice-Hall, Inc.
-
R. E. Walpole, R. H. Myers, S. L. Myers, and K. Ye, Probability & Statistics for Engineers and Scientists. USD, NJ 07458, USA: Prentice-Hall, Inc., 2002.
-
(2002)
Probability & Statistics for Engineers and Scientists
-
-
Walpole, R.E.1
Myers, R.H.2
Myers, S.L.3
Ye, K.4
-
19
-
-
0026374073
-
Bayesian networks without tears
-
E. Charniak, "Bayesian networks without tears," AI Magazine, vol. 12, no. 4, pp. 50-63, 1991.
-
(1991)
AI Magazine
, vol.12
, Issue.4
, pp. 50-63
-
-
Charniak, E.1
-
20
-
-
70349438880
-
A concise cost analysis of Internet malware
-
S. Kondakci, "A concise cost analysis of Internet malware," Computers & Security, vol. 28, no. 7, pp. 648-659, 2009.
-
(2009)
Computers & Security
, vol.28
, Issue.7
, pp. 648-659
-
-
Kondakci, S.1
|