-
2
-
-
26444516466
-
Security vulnerabilities in software systems: A quantitative perspective
-
S. Jajodia and D. Wijesekera (Eds.), Springer, Berlin- Heidelberg, Germany
-
O. Alhazmi, Y. Malaiya and I. Ray, Security vulnerabilities in software systems: A quantitative perspective, in Data and Applications Security XIX (LNCS 3654), S. Jajodia and D. Wijesekera (Eds.), Springer, Berlin- Heidelberg, Germany, pp. 281-294, 2005.
-
(2005)
Data and Applications Security XIX (LNCS 3654)
, pp. 281-294
-
-
Alhazmi, O.1
Malaiya, Y.2
Ray, I.3
-
3
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
A. Avizienis, J. Laprie, B. Randell and C. Landwehr, Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing, vol. 1(1), pp 11-33, 2004.
-
(2004)
IEEE Transactions On Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.2
Randell, B.3
Landwehr, C.4
-
4
-
-
84902509716
-
Threat modeling for SQL servers
-
E. Bertino, D. Bruschi, S. Franzoni, I. Nai Fovino and S. Valtolina, Threat modeling for SQL servers, Proceedings of the Eighth IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, pp. 189-201, 2004.
-
(2004)
Proceedings of the Eighth IFIP TC-6 TC-11 Conference On Communications and Multimedia Security
, pp. 189-201
-
-
Bertino, E.1
Bruschi, D.2
Franzoni, S.3
Nai Fovino, I.4
Valtolina, S.5
-
6
-
-
84902523427
-
-
Citicus, Citicus ONE
-
Citicus, Citicus ONE (www.citicus.com).
-
-
-
-
7
-
-
85189788266
-
The CORAS methodology: Model-based risk management using UML and UP
-
L. Favre (Ed.), IGI Publishing, Hershey, Pennsylvania
-
F. den Braber, T. Dimitrakos, B. Gran, M. Lund, K. Stolen and J. Aagedal, The CORAS methodology: Model-based risk management using UML and UP, in UML and the Unified Process, L. Favre (Ed.), IGI Publishing, Hershey, Pennsylvania, pp. 332-357, 2003.
-
(2003)
UML and The Unified Process
, pp. 332-357
-
-
den Braber, F.1
Dimitrakos, T.2
Gran, B.3
Lund, M.4
Stolen, K.5
Aagedal, J.6
-
9
-
-
84902523428
-
-
Institute of Electrical and Electronics Engineers, IEEE Standard Glossary of Software Engineering Terminology (IEEE Standard 610.12-1990), Piscataway, New Jersey
-
Institute of Electrical and Electronics Engineers, IEEE Standard Glossary of Software Engineering Terminology (IEEE Standard 610.12-1990), Piscataway, New Jersey, 1990.
-
(1990)
-
-
-
10
-
-
84902523419
-
-
International Organization for Standardization, Code of Practice for Information Security Management (ISO/IEC 17799:2000), Geneva, Switzerland
-
International Organization for Standardization, Code of Practice for Information Security Management (ISO/IEC 17799:2000), Geneva, Switzerland, 2000.
-
(2000)
-
-
-
12
-
-
84902523420
-
-
Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors, Technical Report, U.S. Secret Service and CERT Coordination Center, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, Pennsylvania
-
M. Keeney, E. Kowalski, D. Cappelli, A. Moore, T. Shimeall and S. Rogers, Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors, Technical Report, U.S. Secret Service and CERT Coordination Center, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, Pennsylvania, 2005.
-
(2005)
-
-
Keeney, M.1
Kowalski, E.2
Cappelli, D.3
Moore, A.4
Shimeall, T.5
Rogers, S.6
-
14
-
-
36249002076
-
A framework for the security assessment of remote control applications of critical infrastructures
-
M. Masera and I. Nai Fovino, A framework for the security assessment of remote control applications of critical infrastructures, Proceedings of the Twenty-Ninth ESReDA Seminar, 2005.
-
(2005)
Proceedings of the Twenty-Ninth ESReDA Seminar
-
-
Masera, M.1
Nai Fovino, I.2
-
20
-
-
84902523421
-
-
Microsoft Corporation, Microsoft Security Assessment Tool
-
Microsoft Corporation, Microsoft Security Assessment Tool (www.securityguidance.com).
-
-
-
-
22
-
-
84902523422
-
-
SecurityFocus, Bugtraq vulnerability database
-
SecurityFocus, Bugtraq vulnerability database (securityfocus.com).
-
-
-
-
24
-
-
1842829828
-
-
Special Publication 800-30, National Institute of Standards and Technology, U.S. Department of Commerce, Gaithersburg, Maryland
-
G. Stoneburner, A. Goguen and A. Feringa, Risk Management Guide for Information Technology Systems, Special Publication 800-30, National Institute of Standards and Technology, U.S. Department of Commerce, Gaithersburg, Maryland, 2002.
-
(2002)
Risk Management Guide For Information Technology Systems
-
-
Stoneburner, G.1
Goguen, A.2
Feringa, A.3
|