-
3
-
-
78149396361
-
-
Information Assurance Technology Analysis Center (IATAC)
-
Bartol, N., Bates, B., Goertzel, K.M. and Winograd, T. 2009. Measuring cyber security and information assurance: a state-of-the-art report. Information Assurance Technology Analysis Center (IATAC).
-
(2009)
Measuring Cyber Security and Information Assurance: A State-of-the-art Report
-
-
Bartol, N.1
Bates, B.2
Goertzel, K.M.3
Winograd, T.4
-
4
-
-
0003219646
-
The Goal Question Metric Approach
-
Marciniak, J. (ed.), Wiley
-
Basili, V., Caldiera, G., and Rombach, H.D. 1994. The Goal Question Metric Approach. Marciniak, J. (ed.), Encyclopedia of Software Engineering, Wiley.
-
(1994)
Encyclopedia of Software Engineering
-
-
Basili, V.1
Caldiera, G.2
Rombach, H.D.3
-
5
-
-
27544477471
-
Electronic Authentication Guideline
-
National Institute of Standards and Technology
-
Burr, W.E. et al. 2011. Electronic Authentication Guideline. NIST Special Publication 800-63-1. National Institute of Standards and Technology.
-
(2011)
NIST Special Publication 800-63-1
-
-
Burr, W.E.1
-
6
-
-
69849105955
-
Game Theoretic Approach to Threat Prediction and Situation Awareness
-
Chen, G., Shen, D., Kwan, C., Cruz, J.B., Kruger, M., and Blasch, E. 2007. Game Theoretic Approach to Threat Prediction and Situation Awareness. Journal of Advances in Information Fusion, 2(1), 35-48
-
(2007)
Journal of Advances in Information Fusion
, vol.2
, Issue.1
, pp. 35-48
-
-
Chen, G.1
Shen, D.2
Kwan, C.3
Cruz, J.B.4
Kruger, M.5
Blasch, E.6
-
7
-
-
68149115896
-
Game Theory and Risk Analysis
-
DOI=10.1111/j.1539-6924.2009.01247.x
-
Cox, L. A. 2009. Game Theory and Risk Analysis. Risk Analysis, 29(8), 1062-1068. DOI=10.1111/j.1539-6924.2009.01247.x.
-
(2009)
Risk Analysis
, vol.29
, Issue.8
, pp. 1062-1068
-
-
Cox, L.A.1
-
8
-
-
0004320806
-
Health insurance portability and accountability act (HIPAA)
-
HIPAA. 1996
-
HIPAA. 1996. Health insurance portability and accountability act (HIPAA). U.S. Public Law, 104-191, 1996
-
(1996)
U.S. Public Law
, pp. 104-191
-
-
-
13
-
-
84855934497
-
Security metrics for e-healthcare information systems: A domain specific metrics approach
-
Jafari, S., Mtenzi, F., Fitzpatrick, R., and O'Shea, B. 2010. Security metrics for e-healthcare information systems: a domain specific metrics approach. Int. Journal of Digital Society, 1(4), 238-245.
-
(2010)
Int. Journal of Digital Society
, vol.1
, Issue.4
, pp. 238-245
-
-
Jafari, S.1
Mtenzi, F.2
Fitzpatrick, R.3
O'Shea, B.4
-
14
-
-
77953158482
-
-
U.S. National Institute of Standards and Technology, NISTIR 7564
-
Jansen, W. 2009. Directions in Security Metrics Research. U.S. National Institute of Standards and Technology, NISTIR 7564.
-
(2009)
Directions in Security Metrics Research
-
-
Jansen, W.1
-
16
-
-
0142242116
-
Requirement Decomposition and Traceability
-
DOI=10.1007/BF02919970
-
Kirkman, D. 1998. Requirement Decomposition and Traceability, Requirements Engineering, 3(2), 107-114. DOI=10.1007/BF02919970
-
(1998)
Requirements Engineering
, vol.3
, Issue.2
, pp. 107-114
-
-
Kirkman, D.1
-
17
-
-
84891451119
-
A Taxonomy of Decomposition Strategies based on Structures, Behaviors, and Goals
-
Koopman, P. 1995. A Taxonomy of Decomposition Strategies based on Structures, Behaviors, and Goals. In Proc. Design Theory & Methodology, 611-618.
-
(1995)
Proc. Design Theory & Methodology
, pp. 611-618
-
-
Koopman, P.1
-
18
-
-
85152496416
-
-
Version 1. Technical Report DAR/17/12, Norwegian Computing Center
-
Leister, W., Abie, H., and Poslad, S. 2012. Defining ASSET Scenarios - ASSET D6.1 Technical Note: Case study scenarios definition, Version 1. Technical Report DAR/17/12, Norwegian Computing Center.
-
(2012)
Defining ASSET Scenarios - ASSET D6.1 Technical Note: Case Study Scenarios Definition
-
-
Leister, W.1
Abie, H.2
Poslad, S.3
-
19
-
-
84885207675
-
Towards metrics-driven adaptive security management in E-health IoT applications
-
Savola, R., Abie, H., and Sihvonen, M. 2012. Towards metrics-driven adaptive security management in E-health IoT applications. In Proc. BODYNETS 2012, Workshop SeTTIT 2012, 276-281.
-
(2012)
Proc. BODYNETS 2012, Workshop SeTTIT 2012
, pp. 276-281
-
-
Savola, R.1
Abie, H.2
Sihvonen, M.3
-
20
-
-
77958019527
-
Development of measurable security for a distributed messaging system
-
Savola, R. and Abie, H. 2009. Development of measurable security for a distributed messaging system. Int. Journal on Advances in Security, 2(4), 358-380.
-
(2009)
Int. Journal on Advances in Security
, vol.2
, Issue.4
, pp. 358-380
-
-
Savola, R.1
Abie, H.2
-
22
-
-
47949132863
-
Adaptive Markov Game Theoretic Data Fusion Approach for Cyber Network Defense
-
DOI=10.1109/MILCOM.2007.4454758
-
Shen, D., Chen, G., Blasch, E., and Tadda, G. 2007. Adaptive Markov Game Theoretic Data Fusion Approach for Cyber Network Defense. IEEE Military Communications Conference (MILCOM 2007), 1-7. DOI=10.1109/MILCOM.2007.4454758.
-
(2007)
IEEE Military Communications Conference (MILCOM 2007)
, pp. 1-7
-
-
Shen, D.1
Chen, G.2
Blasch, E.3
Tadda, G.4
-
23
-
-
84860724995
-
An Adaptive Markov Game Model for Cyber Threat Intent Inference
-
Meng Joo Erand Yi Zhou (Ed.), ISBN: 978-953-7619-55-4, InTech, DOI=10.5772/6690
-
Shen, D., Chen, G., Cruz, J. J.B., Blasch, E., and Pham, K. 2009. An Adaptive Markov Game Model for Cyber Threat Intent Inference. Theory and Novel Applications of Machine Learning, Meng Joo Erand Yi Zhou (Ed.), ISBN: 978-953-7619-55-4, InTech, 317-334. DOI=10.5772/6690.
-
(2009)
Theory and Novel Applications of Machine Learning
, pp. 317-334
-
-
Shen, D.1
Chen, G.2
Cruz, J.J.B.3
Blasch, E.4
Pham, K.5
-
25
-
-
45749136672
-
A comprehensive and comparative metric for information security
-
Weiss, S., Weissmann, O., and Dressler, F. 2010. A comprehensive and comparative metric for information security. In Proc. ICTSM'05, 0-10.
-
(2010)
Proc. ICTSM'05
, pp. 0-10
-
-
Weiss, S.1
Weissmann, O.2
Dressler, F.3
-
26
-
-
79951507952
-
A Markov Game Theory-based Risk Assessment Model for Network Information System
-
DOI=10.1109/CSSE.2008.949
-
Xiaolin, C., Xiaobin, T. Yong, Z., and Hongsheng, X. 2008. A Markov Game Theory-based Risk Assessment Model for Network Information System. In Proc. 2008 International Conference on Computer Science and Software Engineering, 1057-1061. DOI=10.1109/CSSE.2008.949
-
(2008)
Proc. 2008 International Conference on Computer Science and Software Engineering
, pp. 1057-1061
-
-
Xiaolin, C.1
Xiaobin, T.2
Yong, Z.3
Hongsheng, X.4
|