-
2
-
-
84882651303
-
Why to adopt a security metric? A brief survey
-
Quality of Protection, Springer
-
A. Atzeni and A. Lioy. Why to adopt a security metric? a brief survey. In Quality of Protection, volume 23 of Advanced in Information Security, pages 1-12. Springer, 2006.
-
(2006)
Advanced in Information Security
, vol.23
, pp. 1-12
-
-
Atzeni, A.1
Lioy, A.2
-
3
-
-
50249115131
-
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications
-
IEEE Computer Society
-
D. Balzarotti, M. Cova, V. Felmetsger, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna. Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. In Proc. IEEE Symposium on Security and Privacy, pages 387-401. IEEE Computer Society, 2008.
-
(2008)
Proc. IEEE Symposium on Security and Privacy
, pp. 387-401
-
-
Balzarotti, D.1
Cova, M.2
Felmetsger, V.3
Jovanovic, N.4
Kirda, E.5
Kruegel, C.6
Vigna, G.7
-
5
-
-
0024031604
-
TAME PROJECT: TOWARDS IMPROVEMENT-ORIENTED SOFTWARE ENVIRONMENTS.
-
DOI 10.1109/32.6156
-
V. Basili and H. Rombach. The TAME project: Towards improvement-oriented software environments. IEEE Transactions on Software Engineering, 14(6):758-773, 1988. (Pubitemid 18640017)
-
(1988)
IEEE Transactions on Software Engineering
, vol.14
, Issue.6
, pp. 758-773
-
-
Basili, V.R.1
Rombach H.Dieter2
-
6
-
-
0003219646
-
Goal question metric paradigm
-
J. C. Marciniak, editor, John Wiley & Sons
-
V. R. Basili, G. Caldiera, and H. D. Rombach. Goal question metric paradigm. In J. C. Marciniak, editor, Encyclopedia of Software Engineering, volume 1. John Wiley & Sons, 1994.
-
(1994)
Encyclopedia of Software Engineering
, vol.1
-
-
Basili, V.R.1
Caldiera, G.2
Rombach, H.D.3
-
7
-
-
79952939290
-
-
version 1.0. Special Publication 500-269, National Institute of Standards and Technology
-
P. Black, E. Fong, V. Okun, and R. Gaucher. Software assurance tools: Web application security scanner functional specification version 1.0. Special Publication 500-269, National Institute of Standards and Technology, 2008.
-
(2008)
Software Assurance Tools: Web Application Security Scanner Functional Specification
-
-
Black, P.1
Fong, E.2
Okun, V.3
Gaucher, R.4
-
10
-
-
50549099137
-
Tool support for continuous quality control
-
F. Deissenboeck, E. Juergens, B. Hummel, S. Wagner, B. Mas y Parareda, and M. Pizka. Tool support for continuous quality control. IEEE Softw., 25(5):60-67, 2008.
-
(2008)
IEEE Softw.
, vol.25
, Issue.5
, pp. 60-67
-
-
Deissenboeck, F.1
Juergens, E.2
Hummel, B.3
Wagner, S.4
Mas Y Parareda, B.5
Pizka, M.6
-
11
-
-
78049485828
-
Software quality models: Purposes, usage scenarios and requirements
-
IEEE Computer Society
-
F. Deissenboeck, E. Juergens, K. Lochmann, and S. Wagner. Software quality models: Purposes, usage scenarios and requirements. In Proc. 7th International Workshop on Software Quality (WoSQ 09). IEEE Computer Society, 2009.
-
(2009)
Proc. 7th International Workshop on Software Quality (WoSQ 09)
-
-
Deissenboeck, F.1
Juergens, E.2
Lochmann, K.3
Wagner, S.4
-
12
-
-
47349098250
-
An activity-based quality model for maintainability
-
IEEE Computer Society
-
F. Deissenboeck, S. Wagner, M. Pizka, S. Teuchert, and J. F. Girard. An activity-based quality model for maintainability. In Proc. IEEE International Conference on Software Maintenance (ICSM 2007), pages 184-193. IEEE Computer Society, 2007.
-
(2007)
Proc. IEEE International Conference on Software Maintenance (ICSM 2007)
, pp. 184-193
-
-
Deissenboeck, F.1
Wagner, S.2
Pizka, M.3
Teuchert, S.4
Girard, J.F.5
-
13
-
-
77954617636
-
-
Federal Office for Information Security (BSI) in Germany. IT-Grundschutz Catalogues. https://www.bsi.bund.de/, 2007.
-
(2007)
IT-Grundschutz Catalogues
-
-
-
14
-
-
34648846066
-
Using ranked nodes to model qualitative judgments in bayesian networks
-
DOI 10.1109/TKDE.2007.1073
-
N. E. Fenton, M. Neil, and J. G. Caballero. Using ranked nodes to model qualitative judgments in Bayesian networks. IEEE Transactions on Knowledge and Data Engineering, 19(10):1420-1432, 2007. (Pubitemid 47460364)
-
(2007)
IEEE Transactions on Knowledge and Data Engineering
, vol.19
, Issue.10
, pp. 1420-1432
-
-
Fenton, N.E.1
Neil, M.2
Caballero, J.G.3
-
16
-
-
70349303945
-
Measuring network security using dynamic bayesian network
-
ACM Press
-
M. Frigault, L. Wang, A. Singhal, and S. Jajodia. Measuring network security using dynamic bayesian network. In Proc. 4th ACM Workshop on Quality of Protection (QoP '08), pages 23-30. ACM Press, 2008.
-
(2008)
Proc. 4th ACM Workshop on Quality of Protection (QoP '08)
, pp. 23-30
-
-
Frigault, M.1
Wang, L.2
Singhal, A.3
Jajodia, S.4
-
18
-
-
34547107609
-
Organizing security patterns
-
DOI 10.1109/MS.2007.114
-
M. Hafiz, P. Adamczyk, and R. Johnson. Organizing security patterns. IEEE Softw., 24(4):52-60, 2007. (Pubitemid 47098794)
-
(2007)
IEEE Software
, vol.24
, Issue.4
, pp. 52-60
-
-
Hafiz, M.1
Adamczyk, P.2
Johnson, R.E.3
-
19
-
-
16244388622
-
Non-detrimental web application security scanning
-
IEEE Computer Society
-
Y.-W. Huang, C.-H. Tsai, D. Lee, and S.-Y. Kuo. Non-detrimental web application security scanning. In Proc. 15th International Symposium on Software Reliability Engineering (ISSRE 2004), pages 219-230. IEEE Computer Society, 2004.
-
(2004)
Proc. 15th International Symposium on Software Reliability Engineering (ISSRE 2004)
, pp. 219-230
-
-
Huang, Y.-W.1
Tsai, C.-H.2
Lee, D.3
Kuo, S.-Y.4
-
20
-
-
34250673645
-
Secubat: A web vulnerability scanner
-
ACM Press
-
S. Kals, E. Kirda, C. Kruegel, and N. Jovanovic. Secubat: a web vulnerability scanner. In Proc. 15th International Conference on World Wide Web (WWW '06), pages 247-256. ACM Press, 2006.
-
(2006)
Proc. 15th International Conference on World Wide Web (WWW '06)
, pp. 247-256
-
-
Kals, S.1
Kirda, E.2
Kruegel, C.3
Jovanovic, N.4
-
22
-
-
33845524230
-
Common vulnerability scoring system
-
P. Mell, K. Scarfone, and S. Romanosky. Common vulnerability scoring system. IEEE Security and Privacy, 4(6):85-89, 2006. (Pubitemid 44925881)
-
(2006)
IEEE Security and Privacy
, vol.4
, Issue.6
, pp. 85-89
-
-
Mell, P.1
Scarfone, K.2
Romanosky, S.3
-
25
-
-
41649119187
-
The EMISQ method and its tool support-expert-based evaluation of internal software quality
-
DOI 10.1007/s11334-007-0039-7, Selected papers from SEW-31
-
R. Plösch, H. Gruber, A. Hentschel, C. Körner, G. Pomberger, S. Schiffer, M. Saft, and S. Storck. The EMISQ method and its tool support-expert-based evaluation of internal software quality. Innovations in Systems and Software Engineering, 4(1):3-15, 2008. (Pubitemid 351479537)
-
(2008)
Innovations in Systems and Software Engineering
, vol.4
, Issue.1
, pp. 3-15
-
-
Plosch, R.1
Gruber, H.2
Hentschel, A.3
Korner, C..4
Pomberger, G.5
Schiffer, S.6
Saft, M.7
Storck, S.8
-
26
-
-
77956403351
-
A Bayesian network approach to assess and predict software quality using activity-based quality models
-
S. Wagner. A Bayesian network approach to assess and predict software quality using activity-based quality models. Information and Software Technology, 52(11):1230-1241, 2010.
-
(2010)
Information and Software Technology
, vol.52
, Issue.11
, pp. 1230-1241
-
-
Wagner, S.1
-
28
-
-
59049093651
-
A comprehensive model of usability
-
Proc. Engineering Interactive Systems 2007 EIS '07, Springer
-
S. Winter, S. Wagner, and F. Deissenboeck. A comprehensive model of usability. In In Proc. Engineering Interactive Systems 2007 (EIS '07, volume 4940 of LNCS, pages 106-122. Springer, 2007.
-
(2007)
LNCS
, vol.4940
, pp. 106-122
-
-
Winter, S.1
Wagner, S.2
Deissenboeck, F.3
-
29
-
-
84907851636
-
Towards a quantitative assessment of security in software architectures
-
A. Yautsiukhin, R. Scandariato, T. Heyman, F. Massacci, and W. Joosen. Towards a quantitative assessment of security in software architectures. In Nordic Workshop on Secure IT Systems (NordSec), October 2008.
-
Nordic Workshop on Secure IT Systems (NordSec), October 2008
-
-
Yautsiukhin, A.1
Scandariato, R.2
Heyman, T.3
Massacci, F.4
Joosen, W.5
|