-
2
-
-
17844396492
-
The economic approach of information security
-
T. Tsiakis and G. Stephanides, "The economic approach of information security," Computers & Security, vol.24, pp. 105-108, 2005.
-
(2005)
Computers & Security
, vol.24
, pp. 105-108
-
-
Tsiakis, T.1
Stephanides, G.2
-
3
-
-
17844381878
-
ISRAM: Information security risk analysis method
-
B. Karabacak and I.Sogukpinar "ISRAM: information security risk analysis method," Computers & Security, vol.24, pp. 147-159, 2005.
-
(2005)
Computers & Security
, vol.24
, pp. 147-159
-
-
Karabacak, B.1
Sogukpinar, I.2
-
5
-
-
38149131382
-
Risk assessment method based on business process-oriented asset evaluation for information system security
-
Springer
-
J. Eom, S. Park, Y. Han, T. Chung, "Risk Assessment Method Based on Business Process-Oriented Asset Evaluation for Information System Security," LECTURE NOTES IN COMPUTER SCIENCE, Springer, 2007.
-
(2007)
Lecture Notes in Computer Science
-
-
Eom, J.1
Park, S.2
Han, Y.3
Chung, T.4
-
6
-
-
78650351747
-
-
Arxiv preprint cs.CR/0603129- arxiv.org
-
X. Su, D. Bolzoni, P. van Eck, R. Wieringa, "A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements," Arxiv preprint cs.CR/0603129, 2006 - arxiv.org
-
(2006)
A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements
-
-
Su, X.1
Bolzoni, D.2
Van Eck, P.3
Wieringa, R.4
-
7
-
-
38349008354
-
Business oriented information security management -A layered approach
-
Springer
-
P. Klempt, H. Schmidpeter, S. Sowa, L. Tsinas, "Business Oriented Information Security Management -A Layered Approach," LECTURE NOTES IN COMPUTER SCIENCE, Springer, 2007.
-
(2007)
Lecture Notes in Computer Science
-
-
Klempt, P.1
Schmidpeter, H.2
Sowa, S.3
Tsinas, L.4
-
8
-
-
27144534308
-
Cost-benefit trade-off analysis using BBN for aspect- oriented risk-driven development
-
Shanghai, China, June
-
S. Houmb, G.Georg, R.France, J. Bieman, and J. Jürjens, "Cost-Benefit Trade-Off Analysis using BBN for Aspect- Oriented Risk-Driven Development," in Proceedings of Tenth IEEE International Conference on Engineering of Complex Computer Systems (ICECCS 2005), Shanghai, China, June 2005, pp. 195-204.
-
(2005)
Proceedings of Tenth IEEE International Conference on Engineering of Complex Computer Systems (ICECCS 2005)
, pp. 195-204
-
-
Houmb, S.1
Georg, G.2
France, R.3
Bieman, J.4
Jürjens, J.5
-
9
-
-
84899177670
-
An integrated security verification and security solution design trade-off analysis
-
Chapter 9, 288 pages
-
S. H. Houmb, G. Georg, J. Jürjens, and R. France, "An Integrated Security Verification and Security Solution Design Trade-Off Analysis," Integrating Security and Software Engineering: Advances and Future Visions, Chapter 9, 2006, 288 pages.
-
(2006)
Integrating Security and Software Engineering: Advances and Future Visions
-
-
Houmb, S.H.1
Georg, G.2
Jürjens, J.3
France, R.4
-
10
-
-
39749181513
-
Towards a standar approach for quantifying an ICT security investment
-
May
-
R Bojanc, B Jerman-Blazic, "Towards a standar approach for quantifying an ICT security investment," Computer Standards & Interfaces, v.30, n.4, pp. 216-222, May, 2008.
-
(2008)
Computer Standards & Interfaces
, vol.30
, Issue.4
, pp. 216-222
-
-
Bojanc, R.1
Jerman-Blazic, B.2
-
11
-
-
84974774507
-
Towards operational measures of computer security
-
B. Littlewood, S. Brocklehurst, N. Fenton, P. Mellor, S. Page, D. Wright, J. Dobson, J. McDermid, and D. Gollmann, "Towards Operational Measures of Computer Security," Journal of Computer Security, vol. 2, pp. 211-229, 1993.
-
(1993)
Journal of Computer Security
, vol.2
, pp. 211-229
-
-
Littlewood, B.1
Brocklehurst, S.2
Fenton, N.3
Mellor, P.4
Page, S.5
Wright, D.6
Dobson, J.7
McDermid, J.8
Gollmann, D.9
-
12
-
-
0036926468
-
Modeling and quantification of security attributes of software systems
-
IEEE Computer Society
-
B. Madan, K. Goseva-Popstojanova, K. Vaidyanathan, and K. Trivedi, "Modeling and Quantification of Security Attributes of Software Systems," in Proceedings of the International Conference on Dependable Systems and Networks (DSN'02), vol. 2. IEEE Computer Society, 2002, pp. 505-514.
-
(2002)
Proceedings of the International Conference on Dependable Systems and Networks (DSN'02)
, vol.2
, pp. 505-514
-
-
Madan, B.1
Goseva-Popstojanova, K.2
Vaidyanathan, K.3
Trivedi, K.4
-
13
-
-
2642526260
-
Security analysis of SITAR intrusion tolerance system
-
ACM Press
-
D. Wang, B. Madan, and K. Trivedi, "Security Analysis of SITAR Intrusion Tolerance System," in Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security. ACM Press, 2003, pp. 23-32.
-
(2003)
Proceedings of the 2003 ACM Workshop on Survivable and Self-regenerative Systems: In Association with 10th ACM Conference on Computer and Communications Security
, pp. 23-32
-
-
Wang, D.1
Madan, B.2
Trivedi, K.3
-
14
-
-
84903386529
-
Modelling system integrity of a security critical system using colored petri nets
-
Rome, Italy: WIT Press
-
S. Houmb and K. Sallhammar, "Modelling System Integrity of a Security Critical System Using Colored Petri Nets," in Proceeding of Safety and Security Engineering (SAFE 2005). Rome, Italy: WIT Press, 2005, pp. 3-12.
-
(2005)
Proceeding of Safety and Security Engineering (SAFE 2005)
, pp. 3-12
-
-
Houmb, S.1
Sallhammar, K.2
-
16
-
-
84867345706
-
Predicting availability of systems using BBN in aspect- oriented risk-driven development (AORDD)
-
International Institute of Informatics and Systemics, July, Orlando, Florida, USA
-
S. Houmb, G. Georg, R. France, R. Reddy, and J. Bieman, "Predicting Availability of Systems using BBN in Aspect- Oriented Risk-Driven Development (AORDD)," in Proceedings of the 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Volume X: 2nd Symposium on Risk Management and Cyber-Informatics (RMCI'05). International Institute of Informatics and Systemics, July 2005, pp. 396-403, Orlando, Florida, USA.
-
(2005)
Proceedings of the 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Volume X: 2nd Symposium on Risk Management and Cyber-Informatics (RMCI'05)
, pp. 396-403
-
-
Houmb, S.1
Georg, G.2
France, R.3
Reddy, R.4
Bieman, J.5
-
17
-
-
70349664587
-
Estimating ToE Risk level using CVSS
-
S. Houmb and V.N.L. Franqueira, "Estimating ToE Risk Level Using CVSS," 2009 International Conference on Availability, Reliability and Security, ares, 2009, pp. 718-725
-
(2009)
2009 International Conference on Availability, Reliability and Security, Ares
, pp. 718-725
-
-
Houmb, S.1
Franqueira, V.N.L.2
-
19
-
-
74849123192
-
A review of classification methods for network vulnerability
-
San Antonio, TX, USA, October 11-14
-
Shuyuan Jin, Yong Wang, Xiang Cui, Xiaochun Yun, "A review of classification methods for network vulnerability," in Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics, San Antonio, TX, USA, p. 1171-1175, October 11-14, 2009.
-
(2009)
Proceedings of the 2009 IEEE International Conference on Systems, Man and Cybernetics
, pp. 1171-1175
-
-
Jin, S.1
Wang, Y.2
Cui, X.3
Yun, X.4
-
20
-
-
15744370034
-
A taxonomy of network and computer attacks
-
February
-
S. Hansman and R. Hunt, A taxonomy of network and computer attacks, Computers & Security, Volume 24, Issue 1, February 2005, Pages 31-43
-
(2005)
Computers & Security
, vol.24
, Issue.1
, pp. 31-43
-
-
Hansman, S.1
Hunt, R.2
|