-
3
-
-
2342581753
-
From the ground up: The dimacs software security workshop
-
Mar./Apr.
-
G. McGraw, "From the Ground Up: The DIMACS Software Security Workshop," IEEE Security and Privacy, vol. 1, no. 2, pp. 59-66, Mar./Apr. 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.2
, pp. 59-66
-
-
McGraw, G.1
-
9
-
-
0001383866
-
An introduction to input/output automata
-
Sept.
-
N. Lynch and M. Tuttle, "An Introduction to Input/Output Automata," CWI-Quarterly, vol. 2, no. 3, pp. 219-246, Sept. 1989.
-
(1989)
CWI-Quarterly
, vol.2
, Issue.3
, pp. 219-246
-
-
Lynch, N.1
Tuttle, M.2
-
10
-
-
34547444679
-
-
PhD dissertation, Carnegie Mellon Univ., Dec.
-
P.K. Manadhata, "An Attack Surface Metric," PhD dissertation, Carnegie Mellon Univ., Dec. 2008.
-
(2008)
An Attack Surface Metric
-
-
Manadhata, P.K.1
-
12
-
-
0033346610
-
Critique of software defect prediction models
-
DOI 10.1109/32.815326
-
N.E. Fenton and M. Neil, "A Critique of Software Defect Prediction Models," IEEE Trans. Software Eng., vol. 25, no. 5, pp. 675-689, Sept./Oct. 1999. (Pubitemid 30541838)
-
(1999)
IEEE Transactions on Software Engineering
, vol.25
, Issue.5
, pp. 675-689
-
-
Fenton, N.E.1
Neil, M.2
-
13
-
-
38049122734
-
-
Technical Report CERIAS TR 2005-06, Purdue Univ.
-
R. Gopalakrishna, E. Spafford, and J. Vitek, "Vulnerability Likelihood: A Probabilistic Approach to Software Assurance," Technical Report CERIAS TR 2005-06, Purdue Univ., 2005.
-
(2005)
Vulnerability Likelihood: A Probabilistic Approach to Software Assurance
-
-
Gopalakrishna, R.1
Spafford, E.2
Vitek, J.3
-
14
-
-
77956610962
-
Characterizing the security vulnerability likelihood of software functions
-
D. DaCosta, C. Dahn, S. Mancoridis, and V. Prevelakis, "Characterizing the Security Vulnerability Likelihood of Software Functions," Proc. Int'l Conf. Software Maintenance, 2003.
-
(2003)
Proc. Int'l Conf. Software Maintenance
-
-
Dacosta, D.1
Dahn, C.2
Mancoridis, S.3
Prevelakis, V.4
-
15
-
-
85084162287
-
Setuid Demystified
-
H. Chen, D. Wagner, and D. Dean, "Setuid Demystified," Proc. 11th USENIX Security Symp., pp. 171-190, 2002.
-
(2002)
Proc. 11th USENIX Security Symp.
, pp. 171-190
-
-
Chen, H.1
Wagner, D.2
Dean, D.3
-
17
-
-
84937653154
-
Towards a framework for software measurement validation
-
Dec.
-
B. Kitchenham, S.L. Pfleeger, and N. Fenton, "Towards a Framework for Software Measurement Validation," IEEE Trans. Software Eng., vol. 21, no. 12, pp. 929-944, Dec. 1995.
-
(1995)
IEEE Trans. Software Eng.
, vol.21
, Issue.12
, pp. 929-944
-
-
Kitchenham, B.1
Pfleeger, S.L.2
Fenton, N.3
-
18
-
-
0026869449
-
Methodology for validating software metrics
-
May
-
N. Schneidewind, "Methodology for Validating Software Metrics," IEEE Trans. Software Eng., vol. 18, no. 5, pp. 410-422, May 1992.
-
(1992)
IEEE Trans. Software Eng.
, vol.18
, Issue.5
, pp. 410-422
-
-
Schneidewind, N.1
-
19
-
-
0024071092
-
Evaluating software complexity measures
-
Sept.
-
E. Weyuker, "Evaluating Software Complexity Measures," IEEE Trans. Software Eng., vol. 14, no. 9, pp. 1357-1365, Sept. 1988.
-
(1988)
IEEE Trans. Software Eng.
, vol.14
, Issue.9
, pp. 1357-1365
-
-
Weyuker, E.1
-
21
-
-
0004063774
-
-
TR ISERN-95-03, Fraunhofer Inst. for Experimental Software Eng.
-
L. Briand, K.E. Emam, and S. Morasca, "Theoretical and Empirical Validation of Software Product Measures," TR ISERN-95-03, Fraunhofer Inst. for Experimental Software Eng., 1995.
-
(1995)
Theoretical and Empirical Validation of Software Product Measures
-
-
Briand, L.1
Emam, K.E.2
Morasca, S.3
-
23
-
-
79957863416
-
Properties for security measures of software products
-
May
-
M.Y. Liu and I. Traore, "Properties for Security Measures of Software Products," Applied Math. and Information Science J., vol. 1, no. 2, pp. 129-156, May 2007.
-
(2007)
Applied Math. and Information Science J.
, vol.1
, Issue.2
, pp. 129-156
-
-
Liu, M.Y.1
Traore, I.2
-
24
-
-
79957826919
-
-
Microsoft Corporation
-
Microsoft Corporation, "Microsoft Security Bulletin Search," http://www.microsoft.com/technet/security/current.aspx, 2010.
-
(2010)
Microsoft Security Bulletin Search
-
-
-
28
-
-
0023349750
-
An empirical validation of software cost estimation models
-
C.F. Kemerer, "An Empirical Validation of Software Cost Estimation Models," Comm. ACM, vol. 30, no. 5, pp. 416-429, 1987.
-
(1987)
Comm. ACM
, vol.30
, Issue.5
, pp. 416-429
-
-
Kemerer, C.F.1
-
29
-
-
0034206537
-
Validation of an approach for improving existing measurement frameworks
-
June
-
M.G. Mendonça and V.R. Basili, "Validation of an Approach for Improving Existing Measurement Frameworks," IEEE Trans. Software Eng., vol. 26, no. 6, pp. 484-499, June 2000.
-
(2000)
IEEE Trans. Software Eng.
, vol.26
, Issue.6
, pp. 484-499
-
-
Mendonça, M.G.1
Basili, V.R.2
-
30
-
-
0001859044
-
A Technique for the Measurement of Attitudes
-
June
-
R. Likert, "A Technique for the Measurement of Attitudes," Archives of Psychology, vol. 22, no. 140, pp. 5-55, June 1932.
-
(1932)
Archives of Psychology
, vol.22
, Issue.140
, pp. 5-55
-
-
Likert, R.1
-
33
-
-
79957808007
-
-
S.M. Christey personal communication, 2007.
-
S.M. Christey personal communication, 2007.
-
-
-
-
34
-
-
79957855511
-
-
M. Howard personal communication, 2005.
-
M. Howard personal communication, 2005.
-
-
-
-
35
-
-
79957795181
-
-
Feb.
-
Microsoft Security Research and Defense, http://blogs.technet. com/srd/archive/2008/02/06/the-kill-2d00-bit-faq -3a00- part-1-of-3.aspx, Feb. 2008.
-
(2008)
Microsoft Security Research and Defense
-
-
-
36
-
-
79957838109
-
-
G. Markham, "Reducing Attack Surface," http://weblogs. mozillazine.org/gerv/archives/2007/02/reducing-attack- surface.html, 2009.
-
(2009)
Reducing Attack Surface
-
-
Markham, G.1
-
39
-
-
79960181505
-
Building a whole-program type analysis in eclipse
-
M. Sharp, J. Sawin, and A. Rountev, "Building a Whole-Program Type Analysis in Eclipse," Proc. Eclipse Technology Exchange Workshop Object-Oriented Programming, Systems, Languages, and Applications, pp. 6-10, 2005.
-
(2005)
Proc. Eclipse Technology Exchange Workshop Object-Oriented Programming, Systems, Languages, and Applications
, pp. 6-10
-
-
Sharp, M.1
Sawin, J.2
Rountev, A.3
-
41
-
-
0017292244
-
Design and code inspections to reduce errors in program development
-
M. Fagan, "Design and Code Inspections to Reduce Errors in Program Development," IBM Systems J., vol. 15, no. 3, pp. 182-211, 1976.
-
(1976)
IBM Systems J.
, vol.15
, Issue.3
, pp. 182-211
-
-
Fagan, M.1
-
42
-
-
0347104960
-
Assessing computer security vulnerability
-
J. Alves-Foss and S. Barbosa, "Assessing Computer Security Vulnerability," ACM SIGOPS Operating Systems Rev., vol. 29, no. 3, pp. 3-13, 1995.
-
(1995)
ACM SIGOPS Operating Systems Rev.
, vol.29
, Issue.3
, pp. 3-13
-
-
Alves-Foss, J.1
Barbosa, S.2
-
43
-
-
0029707041
-
Defining an adaptive software security metric from a dynamic software failure tolerance measure
-
J. Voas, A. Ghosh, G. McGraw, F. Charron, and K. Miller, "Defining an Adaptive Software Security Metric from a Dynamic Software Failure Tolerance Measure," Proc. Ann. Conf. Computer Assurance, 1996.
-
(1996)
Proc. Ann. Conf. Computer Assurance
-
-
Voas, J.1
Ghosh, A.2
McGraw, G.3
Charron, F.4
Miller, K.5
-
44
-
-
0033325475
-
Experimenting with quantitative evaluation tools for monitoring operational security
-
DOI 10.1109/32.815323
-
R. Ortalo, Y. Deswarte, and M. Kaâniche, "Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security," IEEE Trans. Software Eng., vol. 25, no. 5, pp. 633-650, Sept./ Oct. 1999. (Pubitemid 30541841)
-
(1999)
IEEE Transactions on Software Engineering
, vol.25
, Issue.5
, pp. 633-650
-
-
Ortalo, R.1
Deswarte, Y.2
Kaaniche, M.3
-
45
-
-
0002670359
-
Attack trees: Modeling security threats
-
B. Schneier, "Attack Trees: Modeling Security Threats," Dr. Dobb's J., vol. 24, no. 12, pp. 21-29, 1999.
-
(1999)
Dr. Dobb's J.
, vol.24
, Issue.12
, pp. 21-29
-
-
Schneier, B.1
-
46
-
-
33749647455
-
Timeto- compromise model for cyber risk reduction estimation
-
M.A. McQueen, W.F. Boyer, M.A. Flynn, and G.A. Beitel, "Timeto- Compromise Model for Cyber Risk Reduction Estimation," Proc. ACM Conf. Computer and Comm. Security Workshop Quality of Protection, Sept. 2005.
-
(2005)
Proc. ACM Conf. Computer and Comm. Security Workshop Quality of Protection, Sept.
-
-
McQueen, M.A.1
Boyer, W.F.2
Flynn, M.A.3
Beitel, G.A.4
-
47
-
-
38949137343
-
Estimating a system's mean time-to-compromise
-
DOI 10.1109/MSP.2008.9
-
D.J. Leversage and E.J. Byres, "Estimating a System's Mean Timeto- Compromise," IEEE Security and Privacy, vol. 6, no. 1, pp. 52-60, Jan./Feb. 2008. (Pubitemid 351229833)
-
(2008)
IEEE Security and Privacy
, vol.6
, Issue.1
, pp. 52-60
-
-
Leversage, D.J.1
Byres, E.J.2
-
48
-
-
27644561245
-
Modeling and simulation in security evaluation
-
DOI 10.1109/MSP.2005.129
-
D.M. Nicol, "Modeling and Simulation in Security Evaluation," IEEE Security and Privacy, vol. 3, no. 5, pp. 71-74, Sept./Oct. 2005. (Pubitemid 41560449)
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.5
, pp. 71-74
-
-
Nicol, D.M.1
-
49
-
-
84974774507
-
Towards operational measures of computer security
-
B. Littlewood, S. Brocklehurst, N. Fenton, P. Mellor, S. Page, D. Wright, J.D.J. McDermid, and D. Gollman, "Towards Operational Measures of Computer Security," J. Computer Security, vol. 2, no. 2/3, pp. 211-230, 1993.
-
(1993)
J. Computer Security
, vol.2
, Issue.2-3
, pp. 211-230
-
-
Littlewood, B.1
Brocklehurst, S.2
Fenton, N.3
Mellor, P.4
Page, S.5
Wright, D.6
McDermid, J.D.J.7
Gollman, D.8
-
50
-
-
0036926468
-
Modeling and quantification of security attributes of software systems
-
B.B. Madan, K. Goseva-Popstojanova, K. Vaidyanathan, and K.S. Trivedi, "Modeling and Quantification of Security Attributes of Software Systems," Proc. Int'l Conf. Dependable Systems and Networks, pp. 505-514, 2002.
-
(2002)
Proc. Int'l Conf. Dependable Systems and Networks
, pp. 505-514
-
-
Madan, B.B.1
Goseva-Popstojanova, K.2
Vaidyanathan, K.3
Trivedi, K.S.4
-
53
-
-
79957828361
-
-
MuSecurity "What Is a Security Analyzer," http://www. musecurity.com/solutions/overview/security.html, 2009.
-
(2009)
What Is A Security Analyzer
-
-
|