|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 93 occurrences of 65 keywords
|
|
|
Results
Found 38 publication records. Showing 38 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Karen Scarfone, Peter Mell |
Vulnerability scoring for security configuration settings. |
QoP |
2008 |
DBLP DOI BibTeX RDF |
common configuration scoring system (ccss), common vulnerability scoring system (cvss), security configuration, vulnerability scoring, risk assessment, vulnerability |
1 | Gunnar Peterson |
The economics of finding and fixing vulnerabilities in distributed systems. |
QoP |
2008 |
DBLP DOI BibTeX RDF |
managing security |
1 | Marcel Frigault, Lingyu Wang 0001, Anoop Singhal, Sushil Jajodia |
Measuring network security using dynamic bayesian network. |
QoP |
2008 |
DBLP DOI BibTeX RDF |
security, intrusion detection, security metric, attack graph |
1 | Michael Gegick, Laurie A. Williams, Jason A. Osborne, Mladen A. Vouk |
Prioritizing software security fortification throughcode-level metrics. |
QoP |
2008 |
DBLP DOI BibTeX RDF |
attack-prone, vulnerability-prone |
1 | Kevin Clark, Ethan Singleton, Stephen Tyree, John Hale |
Strata-Gem: risk assessment through mission modeling. |
QoP |
2008 |
DBLP DOI BibTeX RDF |
mission modeling, risk assessment |
1 | Andy Ozment, Ketil Stølen (eds.) |
Proceedings of the 4th ACM Workshop on Quality of Protection, QoP 2008, Alexandria, VA, USA, October 27, 2008 |
QoP |
2008 |
DBLP BibTeX RDF |
|
1 | Marco Domenico Aime, Andrea S. Atzeni, Paolo Carlo Pomi |
The risks with security metrics. |
QoP |
2008 |
DBLP DOI BibTeX RDF |
runtime risk analysis, security measurement |
1 | Mariano Ceccato, Massimiliano Di Penta, Jasvir Nagra, Paolo Falcarin, Filippo Ricca, Marco Torchiano, Paolo Tonella |
Towards experimental evaluation of code obfuscation techniques. |
QoP |
2008 |
DBLP DOI BibTeX RDF |
empirical studies, software obfuscation |
1 | Yijun Yu, Haruhiko Kaiya, Hironori Washizaki, Yingfei Xiong 0001, Zhenjiang Hu, Nobukazu Yoshioka |
Enforcing a security pattern in stakeholder goal models. |
QoP |
2008 |
DBLP DOI BibTeX RDF |
model transformations, goal models, security patterns, rbac |
1 | Gerardo Canfora, Corrado Aaron Visaggio |
Does enforcing anonymity mean decreasing data usefulness? |
QoP |
2008 |
DBLP DOI BibTeX RDF |
data usefulness, anonymity, data privacy |
1 | Yudistira Asnar, Nicola Zannone |
Perceived risk assessment. |
QoP |
2008 |
DBLP DOI BibTeX RDF |
subjective input, risk assessment, perceived risk |
1 | Yonghee Shin, Laurie A. Williams |
Is complexity really the enemy of software security? |
QoP |
2008 |
DBLP DOI BibTeX RDF |
vulnerability prediction, reliability, software metrics, security metrics, software complexity, fault prediction |
1 | Reijo Savola |
Towards a taxonomy for information security metrics. |
QoP |
2007 |
DBLP DOI BibTeX RDF |
information security metrics, security assurance, network security, software security, information assurance |
1 | Vadim Okun, William F. Guthrie, Romain Gaucher, Paul E. Black |
Effect of static analysis tools on software security: preliminary investigation. |
QoP |
2007 |
DBLP DOI BibTeX RDF |
vulnerability, software security, static analysis tools |
1 | Marco Domenico Aime, Andrea S. Atzeni, Paolo Carlo Pomi |
AMBRA: automated model-based risk analysis. |
QoP |
2007 |
DBLP DOI BibTeX RDF |
computer-aided risk analysis, system modelling, security metrics |
1 | Daniel Boteanu, Edouard Reich, José M. Fernandez 0001, John McHugh |
Implementing and testing dynamic timeout adjustment as a dos counter-measure. |
QoP |
2007 |
DBLP DOI BibTeX RDF |
degradation of service, denial of service, SYN flood |
1 | Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Deswarte |
Defining categories to select representative attack test-cases. |
QoP |
2007 |
DBLP DOI BibTeX RDF |
classification, evaluation, test, intrusion detection systems, attack |
1 | Bertrand Anckaert, Matias Madou, Bjorn De Sutter, Bruno De Bus, Koen De Bosschere, Bart Preneel |
Program obfuscation: a quantitative approach. |
QoP |
2007 |
DBLP DOI BibTeX RDF |
program obfuscation, metrics, quantification |
1 | Yolanta Beres, Adrian Baldwin, Simon Shiu |
Model-based assurance of security controls. |
QoP |
2007 |
DBLP DOI BibTeX RDF |
control effectiveness, models, risk, audit, assurance |
1 | Fabio Massacci, Artsiom Yautsiukhin |
An algorithm for the appraisal of assurance indicators for complex business processes. |
QoP |
2007 |
DBLP DOI BibTeX RDF |
assurance indicator, quality of protection, security indicator, business process, hypergraphs, security metrics |
1 | Lingyu Wang 0001, Anoop Singhal, Sushil Jajodia |
Toward measuring network security using attack graphs. |
QoP |
2007 |
DBLP DOI BibTeX RDF |
intrusion detection, security metrics, attack graphs, vulnerability analysis |
1 | Günter Karjoth, Ketil Stølen (eds.) |
Proceedings of the 3th ACM Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007 |
QoP |
2007 |
DBLP BibTeX RDF |
|
1 | Hongxia Jin, Ginger Myles |
A technique for self-certifying tamper resistant software. |
QoP |
2007 |
DBLP DOI BibTeX RDF |
software tamper resistance, content protection, attack tree, security measurement |
1 | Andy Ozment |
Improving vulnerability discovery models. |
QoP |
2007 |
DBLP DOI BibTeX RDF |
measuring software security, measuring vulnerabilities, vulnerability discovery model, security metrics |
1 | Shari Lawrence Pfleeger |
Measuring up: how to keep security metrics useful and realistic. |
QoP |
2007 |
DBLP DOI BibTeX RDF |
security metrics, security measurement |
1 | Idongesit Mkpong-Ruffin, David A. Umphress, John Hamilton, Juan E. Gilbert |
Quantitative software security risk assessment model. |
QoP |
2007 |
DBLP DOI BibTeX RDF |
quantitative risk assessment, empirical software engineering, software security |
1 | Jari Råman |
Contracting over the quality aspect of security in software product markets. |
QoP |
2006 |
DBLP DOI BibTeX RDF |
contracting, regulation, law, secure software development |
1 | Jelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Roshan K. Thomas, Alefiya Hussain, Stephen Schwab, Calvin Ko |
Measuring denial Of service. |
QoP |
2006 |
DBLP DOI BibTeX RDF |
metrics, denial of service |
1 | John McHugh |
Quality of protection: measuring the unmeasurable? |
QoP |
2006 |
DBLP DOI BibTeX RDF |
measurement, quality, speculation |
1 | Pratyusa K. Manadhata, Jeannette M. Wing, Mark Flynn, Miles McQueen |
Measuring the attack surfaces of two FTP daemons. |
QoP |
2006 |
DBLP DOI BibTeX RDF |
attack surface, attack surface metric, security metric |
1 | Muhammad Abedin, Syeda Nessa, Ehab Al-Shaer, Latifur Khan |
Vulnerability analysis For evaluating quality of protection of security policies. |
QoP |
2006 |
DBLP DOI BibTeX RDF |
security, evaluation, metric, policy |
1 | Joseph Pamula, Sushil Jajodia, Paul Ammann, Vipin Swarup |
A weakest-adversary security metric for network configuration security analysis. |
QoP |
2006 |
DBLP DOI BibTeX RDF |
network security, vulnerability, security metric, attack graphs, exploit, quantitative measure |
1 | Hanno Langweg |
Framework for malware resistance metrics. |
QoP |
2006 |
DBLP DOI BibTeX RDF |
software architecture, malware, resistance |
1 | Günter Karjoth, Fabio Massacci (eds.) |
Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006 |
QoP |
2006 |
DBLP BibTeX RDF |
|
1 | Gyrd Brændeland, Ketil Stølen |
Using model-based security analysis in component-oriented system development. |
QoP |
2006 |
DBLP DOI BibTeX RDF |
security risk analysis, case studies |
1 | O. Sami Saydjari |
Is risk a good security metric? |
QoP |
2006 |
DBLP DOI BibTeX RDF |
security, measurement, metric, management, risk analysis |
1 | Riccardo Scandariato, Bart De Win, Wouter Joosen |
Towards a measuring framework for security properties of software. |
QoP |
2006 |
DBLP DOI BibTeX RDF |
security properties, secure design |
1 | Ho Chung, Clifford Neuman |
Modelling the relative strength of security protocols. |
QoP |
2006 |
DBLP DOI BibTeX RDF |
relative strength, cryptographic protocols, lattice, comparison |
Displaying result #1 - #38 of 38 (100 per page; Change: )
|
|