-
1
-
-
33645766952
-
-
PITAC, The President's Information Technology Advisory Committee, February
-
PITAC, "Cyber Security: A Crisis of Prioritization", The President's Information Technology Advisory Committee, February 2005. http://www.nitrd.gov/pitac/reports/20050301_cybersecurity/cybersecurity.pdf
-
(2005)
Cyber Security: A Crisis of Prioritization
-
-
-
2
-
-
79958059693
-
-
FORTIFY, Whitepaper, Fortify Solutions to Strengthen and Streamline a Microsoft Security Development Lifecycle Implementation
-
FORTIFY, "Optimizing the Microsoft SDL for Secure Development", Whitepaper, Fortify Solutions to Strengthen and Streamline a Microsoft Security Development Lifecycle Implementation, 2010. http://www.fortify.com/servlet/download/public/Optimizing_the_Microsoft_SDL_for_Secure_Development.pdf
-
(2010)
Optimizing the Microsoft SDL for Secure Development
-
-
-
3
-
-
79952768902
-
Implementing case-based reasoning technique to software requirements specifications quality analysis
-
Hajar Mat Jani, Salama A. Mostafa, "Implementing Case-Based Reasoning Technique to Software Requirements Specifications Quality Analysis", IJACT: International Journal of Advancements in Computing Technology, vol. 3, no. 1, pp. 23-31, 2011.
-
(2011)
IJACT: International Journal of Advancements in Computing Technology
, vol.3
, Issue.1
, pp. 23-31
-
-
Jani, H.M.1
Mostafa, S.A.2
-
5
-
-
77951490166
-
-
ASE'07, Atlanta, Georgia, 5-9 November
-
M. Abi-Antoun, D. Wang, P. Torr, "Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security", ASE'07, Atlanta, Georgia, 5-9 November, pp. 393-396, 2007. http://www.cs.cmu.edu/~mabianto/papers/07_ase.pdf
-
(2007)
Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security
, pp. 393-396
-
-
Abi-Antoun, M.1
Wang, D.2
Torr, P.3
-
6
-
-
78649767601
-
-
Technical Report CMUISR-10-106, Carnegie Mellon Univ
-
M. Abi-Antoun, J. M. Barne, "STRIDE-based Security Model in Acme", Technical Report CMUISR-10-106, Carnegie Mellon Univ., 2010. http://reportsarchive.adm.cs.cmu.edu/anon/isr2010/CMU-ISR-10-106.pdf
-
(2010)
STRIDE-based Security Model in Acme
-
-
Abi-Antoun, M.1
Barne, J.M.2
-
8
-
-
33845953194
-
Some aspects of personal information theory
-
United States Military Academy, West Point, NY
-
Sabah Al-Fedaghi, "Some Aspects of Personal Information Theory", 7th Annual IEEE Information Assurance Workshop (IEEE-IAW 2006), United States Military Academy, West Point, NY, pp 155-162, 2006. http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=01652066
-
(2006)
7th Annual IEEE Information Assurance Workshop (IEEE-IAW 2006)
, pp. 155-162
-
-
Al-Fedaghi, S.1
-
9
-
-
77952249802
-
States and conceptualization of software systems
-
Sabah Al-Fedaghi, "States and Conceptualization of Software Systems", International Review on Computers and Software (IRECOS), Vo. 4, No. 6, pp. 718-727, 2009. http://www.praiseworthyprize.com/IRECOS_latest.html#States_and_Conceptual_Modeling_of_Software_Systems
-
(2009)
International Review on Computers and Software (IRECOS)
, vol.4
, Issue.6
, pp. 718-727
-
-
Al-Fedaghi, S.1
-
10
-
-
79958024428
-
Conceptualization of business processes
-
Biopolis, Singapore, (hardcopy proceedings), December
-
Sabah Al-Fedaghi, "Conceptualization of Business Processes", IEEE Asia-Pacific Services Computing Conference (IEEE APSCC 2009), Biopolis, Singapore, pp. 75-79 (hardcopy proceedings), December 2009.
-
(2009)
IEEE Asia-Pacific Services Computing Conference (IEEE APSCC 2009)
, pp. 75-79
-
-
Al-Fedaghi, S.1
-
11
-
-
79952412137
-
Evolution of data into an information hierarchy
-
Sabah Al-Fedaghi, F. Al-Azmi, "Evolution of Data into an Information Hierarchy", Journal of Convergence Information Technology (JCIT), vol. 6, no. 2, pp. 9-21, 2011. http://www.aicit.org/JCIT/ppl/02-FASTJCIT4-965174.pdf
-
(2011)
Journal of Convergence Information Technology (JCIT)
, vol.6
, Issue.2
, pp. 9-21
-
-
Al-Fedaghi, S.1
Al-Azmi, F.2
-
12
-
-
79955696122
-
A conceptual foundation for data loss prevention
-
Sabah Al-Fedaghi, "A Conceptual Foundation for Data Loss Prevention", International Journal of Digital Content Technology and its Applications (JDCTA), vol. 5, no. 3, pp. 293-303, 2011.
-
(2011)
International Journal of Digital Content Technology and its Applications (JDCTA)
, vol.5
, Issue.3
, pp. 293-303
-
-
Al-Fedaghi, S.1
-
13
-
-
77955348878
-
-
Addison-Wesley, Professional
-
Keith Brown, "The NET Developer's Guide to Windows Security", Addison-Wesley, Professional, 2004. http://alt.pluralsight.com/wiki/default.aspx/Keith.GuideBook/HomePage.html
-
(2004)
The net developer's guide to windows security
-
-
Brown, K.1
-
14
-
-
79958043011
-
Evaluating vulnerabilities quantitatively based on the rank of web services confidentiality
-
Duan Youxiang, Gao Yang, "Evaluating Vulnerabilities Quantitatively Based On the Rank of Web Services Confidentiality", Journal of Next Generation Information Technology (JNIT), vol. 2, no. 1, pp. 81-87, 2011.
-
(2011)
Journal of Next Generation Information Technology (JNIT)
, vol.2
, Issue.1
, pp. 81-87
-
-
Youxiang, D.1
Yang, G.2
-
16
-
-
79958046773
-
-
Qualys, "Severities KnowledgeBase", 2010. http://browsercheck.qualys.com/research/rnd/knowledge/severity/
-
(2010)
Severities KnowledgeBase
-
-
Qualys1
-
17
-
-
79958034466
-
-
CORAS
-
CORAS, http://coras.sourceforge.net, 2006.
-
(2006)
-
-
-
20
-
-
0036083194
-
Automated generation and analysis of attack graphs
-
O. Sheyner, J. Haines, S. Jha, R. Lippmann, J. M. Wing, "Automated Generation and Analysis of Attack Graphs", IEEE Symposium on Security and Privacy, pp. 273-284, 2002.
-
(2002)
IEEE Symposium on Security and Privacy
, pp. 273-284
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
22
-
-
79957556153
-
Developing secure systems with umlsec-from business processes to implementation
-
In A. Pfitzmann, D. Fox, M. Kohntopp (eds.), Kiel, Germany. Vieweg Verlag
-
Jan Jurjens, "Developing Secure Systems with UMLsec-From Business Processes to Implementation", In A. Pfitzmann, D. Fox, M. Kohntopp (eds.), Proc. Verl assliche IT-Systeme 2001-Sicherheit in komplexen IT-Infrastrukturen, Kiel, Germany. Vieweg Verlag, 2001.
-
(2001)
Proc. Verl Assliche IT-Systeme 2001Sicherheit in komplexen it-infrastrukturen
-
-
Jurjens, J.1
-
23
-
-
79958073863
-
-
The Open Web Application Security Project (OWASP), 4 May
-
The Open Web Application Security Project (OWASP), "Application Threat Modeling", 4 May 2009. http://www.owasp.org/index.php?title=Application_Threat_Modeling&setlang=en
-
(2009)
Application Threat Modeling
-
-
|