Evaluating software architectures: methods and case studies
Evaluating software architectures: methods and case studies
Writing Secure Code
Software Metrics for Product Assesment
Software Metrics for Product Assesment
Watermarking, tamper-proffing, and obfuscation: tools for software protection
IEEE Transactions on Software Engineering
Software Quality Control
Sandmark--A Tool for Software Protection Research
IEEE Security and Privacy
Exploiting Software: How to Break Code
Exploiting Software: How to Break Code
Taking a Lesson from Stealthy Rootkits
IEEE Security and Privacy
Toward Econometric Models of the Security Risk from Remote Attack
IEEE Security and Privacy
Knowledge for Software Security
IEEE Security and Privacy
Security Meter: A Practical Decision-Tree Model to Quantify Risk
IEEE Security and Privacy
Architecture based analysis of performance, reliability and security of software systems
Proceedings of the 5th international workshop on Software and performance
Modeling and Simulation in Security Evaluation
IEEE Security and Privacy
Engineering models and software quality models: an example and a discussion
Proceedings of the 2008 international workshop on Models in software engineering
Journal of Medical Systems
Hi-index | 0.00 |
Many people consider dongles to be among the strongest forms of copy protection, but how much security do they actually offer? The model presented here aims to monetize the security strength of dongle-protected software by forecasting the amount of time a hypothetical attacker would take to break it.