-
1
-
-
58449124956
-
Synopsis of evaluating security controls based on key performance indicators and stakeholder mission value
-
Nanjing, China
-
Abercrombie RK, Sheldon FT, Mili A (2008) Synopsis of evaluating security controls based on key performance indicators and stakeholder mission value. In: 11th IEEE high assurance systems engineering symposium (HASE '08), Nanjing, China, pp 479-482.
-
(2008)
11th IEEE high assurance systems engineering symposium (HASE '08)
, pp. 479-482
-
-
Abercrombie, R.K.1
Sheldon, F.T.2
Mili, A.3
-
2
-
-
58449091750
-
Methodology for evaluating security controls based on key performance indicators and stakeholder mission
-
Waikoloa, HI
-
Sheldon FT, Abercrombie RK, Mili A (2009) Methodology for evaluating security controls based on key performance indicators and stakeholder mission. In: Proceedings of 42nd annual Hawaii international conference on system sciences (HICSS-42), Waikoloa, HI, p 10.
-
(2009)
Proceedings of 42nd annual Hawaii international conference on system sciences (HICSS-42)
, pp. 10
-
-
Sheldon, F.T.1
Abercrombie, R.K.2
Mili, A.3
-
3
-
-
67650466349
-
Managing complex IT security process with valued based measures
-
Nashville, TN
-
Abercrombie RK, Sheldon FT, Mili A (2009) Managing complex IT security process with valued based measures. In: 2009 IEEE symposium on computational intelligence in cyber security (CICS 2009), Nashville, TN, p 7.
-
(2009)
2009 IEEE symposium on computational intelligence in cyber security (CICS 2009)
, pp. 7
-
-
Abercrombie, R.K.1
Sheldon, F.T.2
Mili, A.3
-
4
-
-
2942753973
-
Specifying reusable security requirements
-
Firesmith D (2004) Specifying reusable security requirements. J Object Technol 3(1): 61-75.
-
(2004)
J Object Technol
, vol.3
, Issue.1
, pp. 61-75
-
-
Firesmith, D.1
-
5
-
-
70350677370
-
Requirement elicitation based on goals with security and privacy policies in electronic commerce
-
Porto, Portugal
-
Rocha SVd, Abdelouahab Z, Freire E (2005) Requirement elicitation based on goals with security and privacy policies in electronic commerce. In: Anais do WER05-workshop em Engenharia de Requisitos, Porto, Portugal, pp 63-74.
-
(2005)
Anais do WER05-workshop em Engenharia de Requisitos
, pp. 63-74
-
-
Rocha, S.V.D.1
Abdelouahab, Z.2
Freire, E.3
-
7
-
-
70350663438
-
E-Commerce authentication:An effective countermeasures design model
-
Angers, France
-
Sawma VD, Probert RL (2003) E-Commerce authentication: an effective countermeasures design model. In: ICEIS 2003, Proceedings of the 5th international conference on enterprise information systems, Angers, France, pp 447-455.
-
(2003)
ICEIS 2003, Proceedings of the 5th international conference on enterprise information systems
, pp. 447-455
-
-
Sawma, V.D.1
Probert, R.L.2
-
8
-
-
70350638068
-
-
Colorado Software Summit 2007, Keystone, CO
-
Pritchett D (2007) The eBay architecture: striking a balance between stability, feature velocity, performance, and cost. In: Colorado Software Summit 2007, Keystone, CO, pp 1-39
-
(2007)
The eBay architecture:Striking a balance between stability,feature velocity, performance, and cost
, pp. 1-39
-
-
Pritchett, D.1
-
10
-
-
78649315627
-
E-business adoption in select Indian firms and segments:A stakeholders' approach through select Indian portals analysis
-
Goswami R, De SK, Datta B (2005) E-business adoption in select Indian firms and segments: a stakeholders' approach through select Indian portals analysis. In: CISTM 2005, conference of information science, technology and management, pp 1-22
-
(2005)
CISTM 2005, conference of information science, technology and management
, pp. 1-22
-
-
Goswami, R.1
De, S.K.2
Datta, B.3
-
12
-
-
70350646591
-
A case study on asprox infection dynamics
-
Italy. Springer, Heidelberg
-
Shin Y, Myers S, Gupta M (2009) A case study on asprox infection dynamics. In: Sixth conference on detection of intrusions and malware & vulnerability assessment (DIMVA 2009), Milan, Italy. Springer, Heidelberg, pp 1-20.
-
(2009)
Sixth conference on detection of intrusions and malware & vulnerability assessment (DIMVA 2009)
, pp. 1-20
-
-
Shin, Y.1
Myers, S.2
Gupta, M.3
-
15
-
-
78649329896
-
-
Anti virus comparative test No 20, November 2008
-
Anti virus comparative test No 20: http://www. av-comparatives. org, November 2008.
-
-
-
|