-
1
-
-
58149203602
-
GEMOM - Significant and Measurable Progess Beyond the State of the Art
-
H. Abie, I. Dattani, M. Novkovic, J. Bigham, S. Topham, and R. Savola, "GEMOM - Significant and Measurable Progess Beyond the State of the Art," ICSNC 2008, Sliema, Malta, Oct. 26-31, 2008, pp. 191-196.
-
ICSNC 2008, Sliema, Malta, Oct. 26-31, 2008
, pp. 191-196
-
-
Abie, H.1
Dattani, I.2
Novkovic, M.3
Bigham, J.4
Topham, S.5
Savola, R.6
-
2
-
-
77950971375
-
Robust, Secure, Self-Adaptive and Resilient Messaging Middleware for Business Critical Systems
-
H. Abie, R. Savola, and I. Dattani, "Robust, Secure, Self-Adaptive and Resilient Messaging Middleware for Business Critical Systems," ADAPTIVE 2009, Athens/Glyfada, Greece, Nov. 15-20, 2009, pp. 153-160.
-
ADAPTIVE 2009, Athens/Glyfada, Greece, Nov. 15-20, 2009
, pp. 153-160
-
-
Abie, H.1
Savola, R.2
Dattani, I.3
-
3
-
-
77953158482
-
-
U.S. National Institute of Standards and Technology (NIST), NISTIR 7564, Apr.
-
W. Jansen, "Directions in Security Metrics Research," U.S. National Institute of Standards and Technology (NIST), NISTIR 7564, Apr. 2009, 21 p.
-
(2009)
Directions in Security Metrics Research
, pp. 21
-
-
Jansen, W.1
-
4
-
-
77749333086
-
Development of Security Metrics for a Distributed Messaging System
-
R. Savola and H. Abie, "Development of Security Metrics for a Distributed Messaging System," AICT 2009, Baku, Azerbaijan, Oct. 14-16, 2009, 6 p.
-
AICT 2009, Baku, Azerbaijan, Oct. 14-16, 2009
, pp. 6
-
-
Savola, R.1
Abie, H.2
-
5
-
-
77958019527
-
Development of Measurable Security for a Distributed Messaging System
-
March 2010
-
R. Savola and H. Abie, "Development of Measurable Security for a Distributed Messaging System," International Journal on Advances in Security, Vol. 2, No. 4, 2009, pp. 358-380 (March 2010).
-
(2009)
International Journal on Advances in Security
, vol.2
, Issue.4
, pp. 358-380
-
-
Savola, R.1
Abie, H.2
-
6
-
-
79952066976
-
SSE-CMM Security Metrics
-
G. Jelen, "SSE-CMM Security Metrics," NIST and CSSPAB Workshop, Washington, D.C., USA, June 2000.
-
NIST and CSSPAB Workshop, Washington, D.C., USA, June 2000
-
-
Jelen, G.1
-
7
-
-
70449502638
-
Identification of Basic Measurable Security Components for a Distributed Messaging System
-
R. Savola and H. Abie, "Identification of Basic Measurable Security Components for a Distributed Messaging System," SECURWARE '09, Athens/Glyfada, Greece, Jun. 18-23, 2009, pp. 121-128.
-
SECURWARE '09, Athens/Glyfada, Greece, Jun. 18-23, 2009
, pp. 121-128
-
-
Savola, R.1
Abie, H.2
-
10
-
-
78149396361
-
-
Inf. Assurance Tech. Analysis Center IATAC, May
-
N. Bartol, B. Bates, K. M. Goertzel, and T. Winograd, "Measuring Cyber Security and Information Assurance: a State-of-the-Art Report," Inf. Assurance Tech. Analysis Center IATAC, May 2009.
-
(2009)
Measuring Cyber Security and Information Assurance: A State-of-the-Art Report
-
-
Bartol, N.1
Bates, B.2
Goertzel, K.M.3
Winograd, T.4
-
11
-
-
78149392355
-
A Security Metrics Taxonomization Model for Software- Intensive Systems
-
Dec.
-
R. Savola, "A Security Metrics Taxonomization Model for Software- Intensive Systems," Journal of Information Processing Systems, Vol. 5, No. 4, Dec. 2009, pp. 197-206.
-
(2009)
Journal of Information Processing Systems
, vol.5
, Issue.4
, pp. 197-206
-
-
Savola, R.1
-
12
-
-
0346052082
-
Towards a Framework for Security Measurement
-
C. Wang and W. A. Wulf, "Towards a Framework for Security Measurement", 20th National Information Systems Security Conference, Baltimore, MD, Oct. 1997, pp. 522-533.
-
20th National Information Systems Security Conference, Baltimore, MD, Oct. 1997
, pp. 522-533
-
-
Wang, C.1
Wulf, W.A.2
-
14
-
-
84988573115
-
The Design and Implementation of Tripwire: A System Integrity Checker
-
Fairfax, VA, Nov. 2-4, 1994
-
G. H. Kim and E. H. Spafford, "The Design and Implementation of Tripwire: a System Integrity Checker," Computer and Communications Security, Fairfax, VA, Nov. 2-4, 1994, pp. 18-29.
-
Computer and Communications Security
, pp. 18-29
-
-
Kim, G.H.1
Spafford, E.H.2
-
15
-
-
77955205925
-
-
On-line. Available: April 14
-
OWASP, Open Web Application Security Project. [On-line]. Available: www.owasp.org [April 14, 2010].
-
(2010)
Open Web Application Security Project
-
-
-
16
-
-
34047178394
-
A Metrics Framework to Drive Application Security Improvement
-
Mar./Apr.
-
E. A. Nichols and G. Peterson, "A Metrics Framework to Drive Application Security Improvement," IEEE Security & Privacy, Mar./Apr. 2007, pp. 88-91.
-
(2007)
IEEE Security & Privacy
, pp. 88-91
-
-
Nichols, E.A.1
Peterson, G.2
-
18
-
-
70449480067
-
-
U.S. National Infrastructure Advisory Council (NIAC)
-
M. Schiffman, G. Eschelbeck, D. Ahmad, A. Wright, and S. Romanosky, "CVSS: A Common Vulnerability Scoring System," U.S. National Infrastructure Advisory Council (NIAC), 2004.
-
(2004)
CVSS: A Common Vulnerability Scoring System
-
-
Schiffman, M.1
Eschelbeck, G.2
Ahmad, D.3
Wright, A.4
Romanosky, S.5
-
19
-
-
0035499176
-
Managing Vulnerabilities in Networked Systems
-
Nov.
-
R. A. Martin, "Managing Vulnerabilities in Networked Systems," IEEE Computer Society Computer Magazine, Vol. 34, No. 11, Nov. 2001.
-
(2001)
IEEE Computer Society Computer Magazine
, vol.34
, Issue.11
-
-
Martin, R.A.1
-
20
-
-
77949789493
-
-
NIST Special Publication 800-177 (Draft), U.S. National Institute of Standards and Technology
-
M. Barrett, C. Johnson, P. Mell, S. Quinn, and K. Scarfone, "Guide to Adopting and Using the Security Content Automation Protocol (SCAP)," NIST Special Publication 800-177 (Draft), U.S. National Institute of Standards and Technology, 2009.
-
(2009)
Guide to Adopting and Using the Security Content Automation Protocol (SCAP)
-
-
Barrett, M.1
Johnson, C.2
Mell, P.3
Quinn, S.4
Scarfone, K.5
-
22
-
-
79952052010
-
-
Web Application Security Consortium (WASC), Version 2.0. [Online]. Available: April 14
-
Web Application Security Consortium (WASC), "Threat Classification," Version 2.0. [Online]. Available: www.webappsec.org [April 14, 2010].
-
(2010)
Threat Classification
-
-
-
23
-
-
79952054193
-
-
Online. Available: April 14
-
SANS Institute, "The Top Cyber Security Security Risks." [Online]. Available: www.sans.org/top-cyber-security-risks/ [April 14, 2010].
-
(2010)
The Top Cyber Security Security Risks
-
-
-
24
-
-
79952046003
-
Core Security Parameters for VoIP in Ad Hoc Networks
-
R. Savola and T. Frantti, "Core Security Parameters for VoIP in Ad Hoc Networks," WPMC '09, Sendai, Japan, Sep. 7-10, 2009, 5 p.
-
WPMC '09, Sendai, Japan, Sep. 7-10, 2009
, pp. 5
-
-
Savola, R.1
Frantti, T.2
-
26
-
-
78149392139
-
On the Feasibility of Utilizing Security Metrics in Software-Intensive Systems
-
Jan.
-
R. Savola, "On the Feasibility of Utilizing Security Metrics in Software-Intensive Systems," International Journal of Computer Science and Network Security, Vol. 10, No. 1, Jan. 2010, pp. 230-239.
-
(2010)
International Journal of Computer Science and Network Security
, vol.10
, Issue.1
, pp. 230-239
-
-
Savola, R.1
-
27
-
-
77958006342
-
Definition of Core Requirements and a Reference Architecture for a Dependable, Secure and Adaptive Distributed Monitoring Framework
-
T. Kanstrén and R. Savola, "Definition of Core Requirements and a Reference Architecture for a Dependable, Secure and Adaptive Distributed Monitoring Framework," DEPEND 2010, Venice, Italy, July 18-25, 2010, 10 p.
-
DEPEND 2010, Venice, Italy, July 18-25, 2010
, pp. 10
-
-
Kanstrén, T.1
Savola, R.2
-
28
-
-
79952061492
-
Security Monitoring in Heterogeneous Globally Distributed Environments
-
P. Venables, "Security Monitoring in Heterogeneous Globally Distributed Environments," Information Security Technical Report, Vol. 3, No. 4, 1998, pp. 15-31.
-
(1998)
Information Security Technical Report
, vol.3
, Issue.4
, pp. 15-31
-
-
Venables, P.1
-
29
-
-
36849071900
-
Constructing Scalable Overlays for Pub-Sub with Many Topics - Problems, Algorithms and Evaluation
-
G. Chockler, R. Melamed, Y. Tock, R. Vitenberg, "Constructing Scalable Overlays for Pub-Sub with Many Topics - Problems, Algorithms and Evaluation," PODC '07, Portland, Oregon, USA, 2007, pp. 109-118.
-
PODC '07, Portland, Oregon, USA, 2007
, pp. 109-118
-
-
Chockler, G.1
Melamed, R.2
Tock, Y.3
Vitenberg, R.4
-
30
-
-
79952061871
-
MOME Project - State of Interoperability
-
Technical Report
-
J. Quittek, A. Bulanza, S. Zander, C. Schmoll, M. Kundt, E. Boschi, J. Sliwinski, "MOME Project - State of Interoperability," MOME Project WP1 Deliverable 11, Technical Report, 2006.
-
(2006)
MOME Project WP1 Deliverable 11
-
-
Quittek, J.1
Bulanza, A.2
Zander, S.3
Schmoll, C.4
Kundt, M.5
Boschi, E.6
Sliwinski, J.7
-
31
-
-
79952056159
-
-
Insecure.org. [Online]. Available: April 14
-
Insecure.org. [Online]. Available: www.insecure.org [April 14, 2010].
-
(2010)
-
-
-
32
-
-
79952047396
-
SecMon: End-to-End Quality and Security Monitoring System
-
th Int. Conf. on Computer Science, Research and Applications (IBIZA '08), Kazimierz Dolny, Poland, Jan. 31-Feb. 2, 2008.
-
th Int. Conf. on Computer Science, Research and Applications (IBIZA '08), Kazimierz Dolny, Poland, Jan. 31-Feb. 2, 2008
-
-
Ciszkowski, T.1
Eliasson, C.2
Fiedler, M.3
Kotulski, Z.4
Lupu, R.5
Mazurczyk, W.6
-
33
-
-
79952054656
-
Annales UMCS
-
Published in
-
Published in Annales UMCS, Informatica, AI 8, pp. 186-201.
-
Informatica, AI
, vol.8
, pp. 186-201
-
-
-
34
-
-
48149094783
-
Boosting-based Distributed and Adaptive Security-Monitoring through Agent Collaboration
-
E. Jean, Y. Jiao, A. R. Hurson, and T. E. Potok, "Boosting-based Distributed and Adaptive Security-Monitoring through Agent Collaboration," IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology 2007 - Workshops, pp. 516-520.
-
IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology 2007 - Workshops
, pp. 516-520
-
-
Jean, E.1
Jiao, Y.2
Hurson, A.R.3
Potok, T.E.4
-
35
-
-
35248860217
-
Towards Security Monitoring Patterns
-
G. Spanoudakis, C. Kloukinas, K. Androutsopoulos, "Towards Security Monitoring Patterns," ACM Sympos. on Applied Computing, Seoul, Korea, 2007, pp. 1518-1525.
-
ACM Sympos. on Applied Computing, Seoul, Korea, 2007
, pp. 1518-1525
-
-
Spanoudakis, G.1
Kloukinas, C.2
Androutsopoulos, K.3
-
36
-
-
78149381059
-
-
SEC-MDA, Enschede, Netherlands, Jun. 24
-
A. Evesti, E. Ovaska, and R. Savola, "From Security Modelling to Run-time Security Monitoring," SEC-MDA, Enschede, Netherlands, Jun. 24, 2009, pp. 33-41.
-
(2009)
From Security Modelling to Run-time Security Monitoring
, pp. 33-41
-
-
Evesti, A.1
Ovaska, E.2
Savola, R.3
-
39
-
-
34748910209
-
-
Technical Report MSU-CSE-03-35, Michigan State University, East Lansing, Michigan, Dec.
-
S. Sadjadi, "A Survey of Adaptive Middleware," Technical Report MSU-CSE-03-35, Michigan State University, East Lansing, Michigan, Dec. 2003.
-
(2003)
A Survey of Adaptive Middleware
-
-
Sadjadi, S.1
|