-
1
-
-
33846217033
-
Degradation models and implied lifetime distributions
-
Bae, S.J., et al.: Degradation models and implied lifetime distributions. Reliability Engineering & System Safety 92(5), 601-608 (2007)
-
(2007)
Reliability Engineering & System Safety
, vol.92
, Issue.5
, pp. 601-608
-
-
Bae, S.J.1
-
4
-
-
0034516080
-
Information security management: An approach to combine process certification and product evaluation
-
Eloff, M.M., von Solms, S.H.: Information security management: An approach to combine process certification and product evaluation. Computers & Security 19(8), 609-698 (2000)
-
(2000)
Computers & Security
, vol.19
, Issue.8
, pp. 609-698
-
-
Eloff, M.M.1
Von Solms, S.H.2
-
9
-
-
77953158482
-
-
Technical Report NISTIR 7564, National institute of Standards and Technology
-
Jansen, W.: Directions in security metric research. Technical Report NISTIR 7564, National institute of Standards and Technology (2009)
-
(2009)
Directions in Security Metric Research
-
-
Jansen, W.1
-
11
-
-
0031123773
-
A quantitative model of the security intrusion process based on attacker behavior
-
Jonsson, E., Olovsson, T.: A quantitative model of the security intrusion process based on attacker behavior. IEEE Transactions on Software Engineering 23(4), 235-245 (1997)
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.4
, pp. 235-245
-
-
Jonsson, E.1
Olovsson, T.2
-
14
-
-
1042277255
-
A method for modeling and quantifying the security attributes of intrusion tolerant systems
-
Madan, B.B., Goseva-Popstojanova, K., Vaidyanathan, K., Trivedi, K.S.: A method for modeling and quantifying the security attributes of intrusion tolerant systems. Performance Evaluatin Journal 1-4(56), 167-186 (2004)
-
(2004)
Performance Evaluatin Journal
, vol.1-4
, Issue.56
, pp. 167-186
-
-
Madan, B.B.1
Goseva-Popstojanova, K.2
Vaidyanathan, K.3
Trivedi, K.S.4
-
16
-
-
34547444679
-
-
Technical Report CMU-CS- 05-155, School of Computer Science. Carnegie Mellon University
-
Manadhata, P., Wing, J.M.: An attack surface metric. Technical Report CMU-CS- 05-155, School of Computer Science. Carnegie Mellon University (2005)
-
(2005)
An Attack Surface Metric
-
-
Manadhata, P.1
Wing, J.M.2
-
17
-
-
67650131779
-
-
Technical Report CMU-CS-07-146, School of Computer Science. Carnegie Mellon University
-
Manadhata, P.K., et al.: An approach to measuring a systems attack surface. Technical Report CMU-CS-07-146, School of Computer Science. Carnegie Mellon University (2007)
-
(2007)
An Approach to Measuring A Systems Attack Surface
-
-
Manadhata, P.K.1
-
18
-
-
0032298158
-
The lognormal distribution of software failure rates: Application to software reliability growth modeling
-
November
-
Mullen, R.: The lognormal distribution of software failure rates: application to software reliability growth modeling. In: The Ninth International Symposium on Software Reliability Engineering, pp. 134-142 (November 1998)
-
(1998)
The Ninth International Symposium on Software Reliability Engineering
, pp. 134-142
-
-
Mullen, R.1
-
19
-
-
0033325475
-
Experimenting with quantitative evaluation tools for monitoring operational security
-
Ortalo, R., et al.: Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering 25(5), 633-650 (1999)
-
(1999)
IEEE Transactions on Software Engineering
, vol.25
, Issue.5
, pp. 633-650
-
-
Ortalo, R.1
-
20
-
-
34547454437
-
A weakest-adversary security metric for network configuration security analysis
-
ACM Press, New York
-
Pamula, J., et al.: A weakest-adversary security metric for network configuration security analysis. In: QoP 2006: Proceedings of the 2nd ACMWorkshop on Quality of Protection, pp. 31-38. ACM Press, New York (2006)
-
(2006)
QoP 2006: Proceedings of the 2nd ACMWorkshop on Quality of Protection
, pp. 31-38
-
-
Pamula, J.1
-
21
-
-
84944051648
-
How to buy better testing
-
Davida, G.I., Frankel, Y., Rees, O. (eds.) InfraSec 2002. Springer, Heidelberg
-
Schechter, S.E.: How to buy better testing. In: Davida, G.I., Frankel, Y., Rees, O. (eds.) InfraSec 2002. LNCS, vol. 2437, pp. 73-87. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2437
, pp. 73-87
-
-
Schechter, S.E.1
-
22
-
-
3042857071
-
On risk: Perception and direction
-
Stewart, A.: On risk: perception and direction. Computers & Security 23(5), 362-370 (2004)
-
(2004)
Computers & Security
, vol.23
, Issue.5
, pp. 362-370
-
-
Stewart, A.1
-
27
-
-
33750984193
-
Minimum-cost network hardening using attack graphs
-
Wang, L., et al.: Minimum-cost network hardening using attack graphs. Computer Communications 29(18), 3812-3824 (2006)
-
(2006)
Computer Communications
, vol.29
, Issue.18
, pp. 3812-3824
-
-
Wang, L.1
|