-
1
-
-
80052167314
-
Faultload representativeness for dependability benchmarking
-
Washington, DC, USA
-
Arlat, J., Crouzet, Y. "Faultload Representativeness for Dependability Benchmarking," in DSN 2002, Washington, DC, USA. 2002.
-
(2002)
DSN 2002
-
-
Arlat, J.1
Crouzet, Y.2
-
3
-
-
77954515647
-
-
formal deliverable AMBER Project - Assessing, Measuring and Benchmarking Resilience, IST - 216295 AMBER, EU FP7 program, Dec.
-
Bondavalli, A. et al, "D3.2: Final Research Roadmap", formal deliverable AMBER Project - Assessing, Measuring and Benchmarking Resilience, IST - 216295 AMBER, EU FP7 program, Dec. 2009.
-
(2009)
D3.2: Final Research Roadmap
-
-
Bondavalli, A.1
-
5
-
-
80052138078
-
-
DBench. Dependability Benchmarking Project. http://spiderman-2.laas.fr/ DBench/
-
-
-
-
10
-
-
77649316514
-
Directions in security metrics research
-
March
-
Jansen, W. "Directions in Security Metrics Research", NISTIR 7564, March 2009
-
(2009)
NISTIR
, vol.7564
-
-
Jansen, W.1
-
11
-
-
84974774507
-
Towards operational measures of computer security
-
Littlewood, B. et al., "Towards Operational Measures of Computer Security", Journal of Computer Security, 2, pp.211-229, 1993.
-
(1993)
Journal of Computer Security
, vol.2
, pp. 211-229
-
-
Littlewood, B.1
-
12
-
-
67650131779
-
-
Carnegie Mellon University: Pittsburgh
-
Manadhata, P., Tan, K., Maxion, R.,Wing, J. "An Approach to Measuring A System's Attack Surface." Carnegie Mellon University: Pittsburgh, 2007.
-
(2007)
An Approach to Measuring A System's Attack Surface.
-
-
Manadhata, P.1
Tan, K.2
Maxion, R.3
Wing, J.4
-
13
-
-
70350555263
-
Trust, untrust, distrust and mistrust - An exploration of the dark(er) side
-
Paris, France.
-
Marsh, S., Dibben, M. "Trust, Untrust, Distrust and Mistrust - An Exploration of the Dark(er) Side". iTrust 2005, Paris, France. 2005.
-
(2005)
ITrust 2005
-
-
Marsh, S.1
Dibben, M.2
-
15
-
-
80052177094
-
Distinguisher and related-key attack on the full AES-256
-
Santa Barbara, California, USA
-
Nikolić, I. "Distinguisher and Related-Key Attack on the Full AES-256". CRYPTO 2009. Santa Barbara, California, USA. 2009.
-
(2009)
CRYPTO 2009
-
-
Nikolić, I.1
-
16
-
-
47849117993
-
-
SANS Institute Information Security Reading Room, June
-
Payne, S. C. "A Guide to Security Metrics", SANS Institute Information Security Reading Room, June 2006.
-
(2006)
A Guide to Security Metrics
-
-
Payne, S.C.1
-
17
-
-
33646357597
-
A vector model of trust for developing trustworthy systems
-
France.
-
Ray, I., Chakraborty, S. "A Vector Model of Trust for Developing Trustworthy Systems". ESORICS 2004. France. 2004.
-
(2004)
ESORICS 2004
-
-
Ray, I.1
Chakraborty, S.2
-
19
-
-
80052166020
-
Trust-terms ontology for defining security requirements and metrics
-
Copenhagen, Denmark
-
Sullivan, K., Clarke J., Mulcahy B. P. "Trust-terms Ontology for Defining Security Requirements and Metrics". ECSA 2010. Copenhagen, Denmark, 2010.
-
(2010)
ECSA 2010
-
-
Sullivan, K.1
Clarke, J.2
Mulcahy, B.P.3
-
20
-
-
84901390778
-
Security metrics for communication systems
-
Newport, Rhode Island
-
Torgerson, M., "Security Metrics for Communication Systems", 12th ICCRTS, Newport, Rhode Island, 2007.
-
(2007)
12th ICCRTS
-
-
Torgerson, M.1
-
21
-
-
80052156094
-
-
Transaction Processing Performance Council (TPC) - http://www.tpc.org
-
-
-
-
22
-
-
33646754186
-
Finding collisions in the full SHA-1
-
Santa Barbara, California, USA
-
Wang, X. et al "Finding Collisions in the Full SHA-1", CRYPTO 2005. Santa Barbara, California, USA. 2005.
-
(2005)
CRYPTO 2005
-
-
Wang, X.1
|