-
1
-
-
79953147561
-
-
Anderson and Reinertsen 2010, Blue Hole Press, Sequiem, WA
-
[Anderson and Reinertsen 2010] Anderson, D.J., Reinertsen, D.G., "Kanban - Successful Evolutionary Change for Your Technology Business," Blue Hole Press, Sequiem, WA.
-
Kanban - Successful Evolutionary Change For Your Technology Business
-
-
Anderson, D.J.1
Reinertsen, D.G.2
-
2
-
-
84878047431
-
Evolution of the Voice Interconnect
-
Baldwin et al. 2010
-
[Baldwin et al. 2010] Balwin, J., Ewert, J., Yamen, S., "Evolution of the Voice Interconnect," Ericsson Review No. 2, 2010, 10-15.
-
(2010)
Ericsson Review No. 2
, pp. 10-15
-
-
Balwin, J.1
Ewert, J.2
Yamen, S.3
-
3
-
-
84866246940
-
Guide to Adopting and Using the Security Content Automation Protocol (SCAP)
-
Barrett et al. 2009, U.S. National Institute of Standards and Technology
-
[Barrett et al. 2009] Barrett, M., Johnson, C., Mell, P., Quinn, S., Scarfone, K., "Guide to Adopting and Using the Security Content Automation Protocol (SCAP)," NIST Special Publication 800-117 (Draft), U.S. National Institute of Standards and Technology, 2009.
-
(2009)
NIST Special Publication 800-117 (Draft)
-
-
Barrett, M.1
Johnson, C.2
Mell, P.3
Quinn, S.4
Scarfone, K.5
-
4
-
-
81155147304
-
Measuring Cyber Security and Information Assurance: A State-of-the-Art Report
-
Bartol et al. 2009, May
-
[Bartol et al. 2009] Bartol, N., Bates, B., Goertzel, K. M., Winograd, T., "Measuring Cyber Security and Information Assurance: a State-of-the-Art Report," Information Assurance Technology Analysis Center IATAC, May 2009.
-
(2009)
Information Assurance Technology Analysis Center IATAC
-
-
Bartol, N.1
Bates, B.2
Goertzel, K.M.3
Winograd, T.4
-
5
-
-
0012077488
-
-
Basili et al. 1994
-
[Basili et al. 1994] Basili, V., Caldiera, G., Rombach, H.D., "The Goal Question Metric Approach," 1994.
-
(1994)
The Goal Question Metric Approach
-
-
Basili, V.1
Caldiera, G.2
Rombach, H.D.3
-
6
-
-
27544477471
-
Electronic Authentication Guideline
-
Burr 2008, U.S. Department of Commerce, NIST SP 800-63-1, Draft
-
[Burr 2008] Burr, W.E. et al. 2008. "Electronic Authentication Guideline," National Institute of Standards and Technology, U.S. Department of Commerce, NIST SP 800-63-1, Draft.
-
(2008)
National Institute of Standards and Technology
-
-
Burr, W.E.1
-
7
-
-
0003488008
-
-
Card et al. 1999, Morgan Kaufmann Publishers, San Francisco, CA
-
[Card et al. 1999] Card, S.K., Mackinlay, J.D., Shneiderman, B., "Readings in Information Visualization: Using Vision to Think," Morgan Kaufmann Publishers, San Francisco, CA, 1999, 686 p.
-
(1999)
Readings In Information Visualization: Using Vision to Think
, pp. 686
-
-
Card, S.K.1
Mackinlay, J.D.2
Shneiderman, B.3
-
8
-
-
81155123884
-
Operational Security Assurance Evaluation in Open Infrastructures
-
Haddad et al. 2011
-
[Haddad et al. 2011] Haddad, S., Dubus, S., Hecker, A., Kanstrén, T., Marquet, B., Savola, R., "Operational Security Assurance Evaluation in Open Infrastructures", Proc. CRiSIS 2011, pp. 100-105.
-
(2011)
Proc. CRiSIS
, pp. 100-105
-
-
Haddad, S.1
Dubus, S.2
Hecker, A.3
Kanstrén, T.4
Marquet, B.5
Savola, R.6
-
9
-
-
84866233732
-
Efficient Softswitching
-
Ericsson 2009
-
[Ericsson 2009] "Efficient Softswitching," Whitepaper, Ericsson, 2009. 11 p.
-
(2009)
Whitepaper, Ericsson
, pp. 11
-
-
-
10
-
-
10844249458
-
Security Architectures for Mobile Networks
-
Eschenbrücher et al. 2004
-
[Eschenbrücher et al. 2004] Eschenbrücher, D., Mellberg, J., Niklander, S., Näslund, M., Palm, P., Sahlin, B., "Security Architectures for Mobile Networks", Ericsson Review No. 2, 2004, 68-81.
-
(2004)
Ericsson Review
, vol.2
, pp. 68-81
-
-
Eschenbrücher, D.1
Mellberg, J.2
Niklander, S.3
Näslund, M.4
Palm, P.5
Sahlin, B.6
-
11
-
-
78649431229
-
-
Frühwirth et al. 2010, Proc. MetriSec'10
-
[Frühwirth et al. 2010] Frühwirth C., Biffl S., Tabatabai M., Weippl E., "Addressing Misalignment between Information Security Metrics and Business-driven Security Objectives," Proc. MetriSec'10.
-
Addressing Misalignment Between Information Security Metrics and Business-driven Security Objectives
-
-
Frühwirth, C.1
Biffl, S.2
Tabatabai, M.3
Weippl, E.4
-
12
-
-
85179193377
-
-
Hermann 2007, Auerbach Publications
-
[Hermann 2007] Herrmann, D. S., "Complete Guide to Security and Privacy Metrics - Measuring Regulatory Compliance, Operational Resilience and ROI," Auerbach Publications, 2007, 824 p.
-
(2007)
Complete Guide to Security and Privacy Metrics - Measuring Regulatory Compliance, Operational Resilience and ROI
, pp. 824
-
-
Herrmann, D.S.1
-
13
-
-
34250156527
-
Writing Secure Code
-
Howard and LeBlanc 2003
-
[Howard and LeBlanc 2003] Howard, M. and LeBlanc, D., "Writing Secure Code," Microsoft, 2003.
-
(2003)
Microsoft
-
-
Howard, M.1
Leblanc, D.2
-
17
-
-
84866233725
-
Series H: Audiovisual and Multimedia Systems - Infrastructure of Audiovisual Services - Communication Procedures - Gateway Control Protocol: Version 3
-
ITU-T 2005, International Telecommunication Union, Telecommunication Standardization Sector (ITU-T), Geneva, Switzerland
-
[ITU-T 2005] International Telecommunication Union, Telecommunication Standardization Sector (ITU-T), "Series H: Audiovisual and Multimedia Systems - Infrastructure of Audiovisual Services - Communication Procedures - Gateway Control Protocol: Version 3," ITU-T Recommendation H.248.1, Geneva, Switzerland, 2005, 195 p.
-
(2005)
ITU-T Recommendation H.248.1
, pp. 195
-
-
-
19
-
-
84872856964
-
An Adaptive and Dependable Distributed Monitoring Framework
-
Kanstrén et al. 2011
-
[Kanstrén et al. 2011] Kanstrén, T., Savola, R., Haddad, S., Hecker, A., "An Adaptive and Dependable Distributed Monitoring Framework," Int. Journal on Advances in Security, 4(1&2), 1-19.
-
Int. Journal On Advances In Security
, vol.4
, Issue.1-2
, pp. 1-19
-
-
Kanstrén, T.1
Savola, R.2
Haddad, S.3
Hecker, A.4
-
22
-
-
84880727392
-
Applied Security Visualization
-
Marty 2008
-
[Marty 2008] Marty, R., "Applied Security Visualization", Addison-Wesley, 2008, 552 p.
-
(2008)
Addison-Wesley
, pp. 552
-
-
Marty, R.1
-
24
-
-
20444495766
-
PortVis: A Tool for Port-Based Detection of Security Events
-
McPherson et al. 2004
-
[McPherson et al. 2004] McPherson, J., Ma, K.-L., Krystosk, P., Bartoletti, T., Christensen, M., "PortVis: A Tool for Port-Based Detection of Security Events", Proc. VizSE'04, 73-81.
-
Proc. VizSE'04
, pp. 73-81
-
-
McPherson, J.1
Ma, K.-L.2
Krystosk, P.3
Bartoletti, T.4
Christensen, M.5
-
25
-
-
84866246945
-
-
Ouedraogo et al. 2008, Proc. NTMS'08
-
[Ouedraogo et al. 2008] Ouedraogo, M., Khadraoui, D., de Rémont, B., Dubois, E., Mouratidis, H., "Deployment of a Security Assurance Monitoring Framework for Telecommunication Service Infrastructure on a VoIP System," Proc. NTMS'08.
-
Deployment of a Security Assurance Monitoring Framework For Telecommunication Service Infrastructure On a VoIP System
-
-
Ouedraogo, M.1
Khadraoui, D.2
de Rémont, B.3
Dubois, E.4
Mouratidis, H.5
-
26
-
-
84866233729
-
A Taxonomical Approach for Information Security Metrics Development
-
Savola 2007, Reykjavik, Iceland
-
[Savola 2007] Savola, R., "A Taxonomical Approach for Information Security Metrics Development," Nordsec'07 Supplemental Booklet of Short Papers, Reykjavik, Iceland, 11 p.
-
Nordsec'07 Supplemental Booklet of Short Papers
, pp. 11
-
-
Savola, R.1
-
27
-
-
78149392355
-
A Security Metrics Taxonomization Model for Software-Intensive Systems
-
Savola 2009, Dec
-
[Savola 2009] Savola, R., "A Security Metrics Taxonomization Model for Software-Intensive Systems," Journal of Information Processing Systems, Vol. 5, No. 4, Dec. 2009, 197-206.
-
(2009)
Journal of Information Processing Systems
, vol.5
, Issue.4
, pp. 197-206
-
-
Savola, R.1
-
28
-
-
78149392139
-
On the Feasibility of Utilizing Security Metrics in Software-Intensive Systems
-
Savola 2010
-
[Savola 2010] Savola, R., "On the Feasibility of Utilizing Security Metrics in Software-Intensive Systems," Int. Journal of Computer Science and Network Security, 10(1), 230-239.
-
Int. Journal of Computer Science and Network Security
, vol.10
, Issue.1
, pp. 230-239
-
-
Savola, R.1
-
29
-
-
77958019527
-
Development of Measurable Security for a Distributed Messaging System
-
Savola and Abie 2010
-
[Savola and Abie 2010] Savola, R., Abie, H., "Development of Measurable Security for a Distributed Messaging System," Int. Journal on Advances in Security, 2(4), 358-380.
-
Int. Journal On Advances In Security
, vol.2
, Issue.4
, pp. 358-380
-
-
Savola, R.1
Abie, H.2
-
30
-
-
84875991371
-
Increasing Measurability and Meaningfulness of Adaptive Security Monitoring by System Architectural Design and Mechanisms
-
Savola and Heinonen 2011a
-
[Savola and Heinonen 2011a] Savola, R., Heinonen, P., "Increasing Measurability and Meaningfulness of Adaptive Security Monitoring by System Architectural Design and Mechanisms," Int. Journal on Advances in Systems and Measurements, 4(1&2), 1-19.
-
Int. Journal On Advances In Systems and Measurements
, vol.4
, Issue.1-2
, pp. 1-19
-
-
Savola, R.1
Heinonen, P.2
-
31
-
-
80053954598
-
A Visualization and Modeling Tool for Security Metrics and Measurements Management
-
Savola and Heinonen 2011b
-
[Savola and Heinonen 2011b] Savola, R., Heinonen, P., "A Visualization and Modeling Tool for Security Metrics and Measurements Management," Proc. ISSA 2011, 8 p.
-
(2011)
Proc. ISSA
, pp. 8
-
-
Savola, R.1
Heinonen, P.2
-
32
-
-
78149472349
-
Towards Security Effectiveness Measurement Utilizing Risk-Based Security Assurance
-
Savola, Pentikäinen and Ouedraogo 2010
-
[Savola, Pentikäinen and Ouedraogo 2010] Savola, R., Pentikäinen, H. and Ouedraogo, M., "Towards Security Effectiveness Measurement Utilizing Risk-Based Security Assurance," Proc. ISSA 2010, 8 p.
-
(2010)
Proc. ISSA
, pp. 8
-
-
Savola, R.1
Pentikäinen, H.2
Ouedraogo, M.3
-
33
-
-
84862064647
-
Agile Software Development with Scrum
-
Schwaber and Beedle 2001
-
[Schwaber and Beedle 2001] Schwaber, K., Beedle, M., "Agile Software Development with Scrum," Prentice Hall, 2001.
-
(2001)
Prentice Hall
-
-
Schwaber, K.1
Beedle, M.2
-
34
-
-
84866244157
-
-
SecViz 2011, Jan. 15
-
[SecViz 2011] Security Visualization. http://www.secviz.org/node/89 [Jan. 15, 2012].
-
(2012)
Security Visualization
-
-
-
35
-
-
77950875313
-
Quantified Security is a Weak Hypothesis: A Critical Survey of Results and Assumptions
-
Verendel 2009, Oxford, U.K
-
[Verendel 2009] Verendel, V., "Quantified Security is a Weak Hypothesis: a Critical Survey of Results and Assumptions," New Security Paradigms Workshop, Oxford, U.K., 2009, 37-50.
-
(2009)
New Security Paradigms Workshop
, pp. 37-50
-
-
Verendel, V.1
-
36
-
-
84866244156
-
Some Problems in Quantified Security
-
Verendel 2010, Göteborg, Sweden
-
[Verendel 2010] Verendel, V., "Some Problems in Quantified Security," Licentiate Thesis, Chalmers University of Technology, Göteborg, Sweden, 2010.
-
(2010)
Licentiate Thesis, Chalmers University of Technology
-
-
Verendel, V.1
|