-
1
-
-
0242621900
-
-
RAND Santa Monica, CA
-
R. Anderson, P. Feldman, S. Gerwehr, B. Houghton, R. Mesic, J. Pinder, J. Rothenberg, and J. Chiesa Securing the U.S. Defense Information Infrastructure: A Proposed Approach 1999 RAND Santa Monica, CA
-
(1999)
Securing the U.S. Defense Information Infrastructure: A Proposed Approach
-
-
Anderson, R.1
Feldman, P.2
Gerwehr, S.3
Houghton, B.4
Mesic, R.5
Pinder, J.6
Rothenberg, J.7
Chiesa, J.8
-
3
-
-
33750958509
-
Defense trees for economic evaluation of security investments
-
DOI 10.1109/ARES.2006.46, 1625338, Proceedings - First International Conference on Availability, Reliability and Security, ARES 2006
-
S. Bistarelli, F. Fioravanti, and P. Peretti Defense trees for economic evaluation of security investments ARES 2006 416 423 (Pubitemid 44732672)
-
(2006)
Proceedings - First International Conference on Availability, Reliability and Security, ARES 2006
, vol.2006
, pp. 416-423
-
-
Bistarelli, S.1
Fioravanti, F.2
Peretti, P.3
-
5
-
-
24644494525
-
Information Security Breaches Survey
-
DTI Department of Trade and Industry
-
DTI Information Security Breaches Survey Tech. rep 2004 Department of Trade and Industry
-
(2004)
Tech. Rep
-
-
-
7
-
-
0004215426
-
-
Kluwer Academic Publishers Norwell, MA, USA
-
F. Glover, and M. Laguna Tabu Search 1997 Kluwer Academic Publishers Norwell, MA, USA
-
(1997)
Tabu Search
-
-
Glover, F.1
Laguna, M.2
-
8
-
-
32544451794
-
Matching information security vulnerabilities to organizational security profiles: A genetic algorithm approach
-
DOI 10.1016/j.dss.2004.06.004, PII S0167923604001332
-
M. Gupta, J. Rees, A. Chaturvedi, and J. Chi Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach Decision Support Systems 41 2006 592 603 (Pubitemid 43233889)
-
(2006)
Decision Support Systems
, vol.41
, Issue.3
, pp. 592-603
-
-
Gupta, M.1
Rees, J.2
Chaturvedi, A.3
Chi, J.4
-
9
-
-
84862557032
-
-
IBM Accessed before 1st of October 2011
-
IBM Software online catalog http://www-01.ibm.com/software/info/app/ ecatalog 2011 Accessed before 1st of October 2011
-
(2011)
Software Online Catalog
-
-
-
14
-
-
79251470551
-
A globus-based distributed enumerative search algorithm for multi-objective optimization
-
Departamento de Lenguajes y Ciencias de la Computacion, University of Malaga
-
F. Luna, A.J. Nebro, and E. Alba A globus-based distributed enumerative search algorithm for multi-objective optimization Tech. rep 2004 Departamento de Lenguajes y Ciencias de la Computacion, University of Malaga
-
(2004)
Tech. Rep
-
-
Luna, F.1
Nebro, A.J.2
Alba, E.3
-
17
-
-
78449280453
-
A visualisation technique for the identification of security threats in networked systems
-
C. Maple, and V. Viduto A visualisation technique for the identification of security threats in networked systems Information Visualisation 2010 551 556
-
(2010)
Information Visualisation
, pp. 551-556
-
-
Maple, C.1
Viduto, V.2
-
18
-
-
51049107864
-
A complete guide to the common vulnerability scoring system version 2.0
-
P. Mell, K. Scarfone, and S. Romanosky A complete guide to the common vulnerability scoring system version 2.0 Tech. rep 2007
-
(2007)
Tech. Rep
-
-
Mell, P.1
Scarfone, K.2
Romanosky, S.3
-
20
-
-
33750953084
-
Workshop-based multiobjective security safeguard selection
-
DOI 10.1109/ARES.2006.144, 1625332, Proceedings - First International Conference on Availability, Reliability and Security, ARES 2006
-
T. Neubauer, C. Stummer, and E. Weippl Workshop-based multiobjective security safeguard selection International Conference on Availability, Reliability and Security 2006 366 373 (Pubitemid 44732666)
-
(2006)
Proceedings - First International Conference on Availability, Reliability and Security, ARES 2006
, vol.2006
, pp. 366-373
-
-
Neubauer, T.1
Stummer, C.2
Weippl, E.3
-
21
-
-
48249084117
-
Interactive selection of ISO 27001 controls under multiple objectives
-
T. Neubauer, A. Ekelhart, and S. Fenz Interactive selection of ISO 27001 controls under multiple objectives SEC 2008 477 492
-
(2008)
SEC
, pp. 477-492
-
-
Neubauer, T.1
Ekelhart, A.2
Fenz, S.3
-
22
-
-
84882740544
-
Vulnerability-specific execution filtering for exploit prevention on commodity software
-
J. Newsome, D. Brumley, and D.X. Song Vulnerability-specific execution filtering for exploit prevention on commodity software NDSS 2006
-
(2006)
NDSS
-
-
Newsome, J.1
Brumley, D.2
Song, D.X.3
-
24
-
-
84944727025
-
Efficient minimum-cost network hardening via exploit dependency graphs
-
S. Noel, S. Jajodia, B. O'Berry, and M. Jacobs Efficient minimum-cost network hardening via exploit dependency graphs ACSAC 2003 86 95
-
(2003)
ACSAC
, pp. 86-95
-
-
Noel, S.1
Jajodia, S.2
O'Berry, B.3
Jacobs, M.4
-
26
-
-
84862557034
-
-
Softerra Accessed before 1st of October 2011
-
Softerra Softerra LDAP administrator http://www.ldapbrowser.com/purchase. htm 2011 Accessed before 1st of October 2011
-
(2011)
Softerra LDAP Administrator
-
-
-
28
-
-
33744465957
-
-
Symantec Accessed before 1st of October 2011
-
Symantec SSL certificates https://www.verisign.co.uk/ssl Accessed before 1st of October 2011
-
SSL Certificates
-
-
-
29
-
-
83455215832
-
Information security - Best practice measures for protecting your business
-
Department of Trade and Industry
-
M. Templeman, M. Beishon, L. Malachowski, A. Wilson, T. Nash, and L. Robertson Information security - best practice measures for protecting your business Tech. rep 2005 Department of Trade and Industry
-
(2005)
Tech. Rep
-
-
Templeman, M.1
Beishon, M.2
Malachowski, L.3
Wilson, A.4
Nash, T.5
Robertson, L.6
-
31
-
-
84862587703
-
-
US-CERT Accessed before 1st of April 2011
-
US-CERT Introduction to recommended practices http://www.us-cert.gov/ control-systems/practices/ Accessed before 1st of April 2011
-
Introduction to Recommended Practices
-
-
-
32
-
-
84862527936
-
Information Security Breaches Survey
-
PriceWaterHouseCoopers
-
S. Vadera, C. Potter, and A. Beard Information Security Breaches Survey Tech. rep 2008 PriceWaterHouseCoopers
-
(2008)
Tech. Rep
-
-
Vadera, S.1
Potter, C.2
Beard, A.3
-
33
-
-
77952903083
-
2008 Data Breach Investigations Report
-
Verizon Verizon Business RISK Team
-
Verizon 2008 Data Breach Investigations Report Tech. rep 2008 Verizon Business RISK Team
-
(2008)
Tech. Rep
-
-
-
34
-
-
79952085816
-
An analytical evaluation of network security modelling techniques applied to manage threats, International Conference on Broadband, Wireless Computing
-
V. Viduto, C. Maple, and W. Huang An analytical evaluation of network security modelling techniques applied to manage threats, International Conference on Broadband, Wireless Computing Communication and Applications 2010 117 123
-
(2010)
Communication and Applications
, pp. 117-123
-
-
Viduto, V.1
Maple, C.2
Huang, W.3
-
36
-
-
33750984193
-
Minimum-cost network hardening using attack graphs
-
DOI 10.1016/j.comcom.2006.06.018, PII S0140366406002271
-
L. Wang, S. Noel, and S. Jajodia Minimum-cost network hardening using attack graphs Computer Communications 29 2006 3812 3824 (Pubitemid 44751132)
-
(2006)
Computer Communications
, vol.29
, Issue.18
, pp. 3812-3824
-
-
Wang, L.1
Noel, S.2
Jajodia, S.3
|