Computer security handbook (2nd ed.)
Computer security handbook (2nd ed.)
Communications of the ACM
Security in computing
A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior
IEEE Transactions on Software Engineering
An integrated framework for security and dependability
Proceedings of the 1998 workshop on New security paradigms
Applying the dependability paradigm to computer security
NSPW '95 Proceedings of the 1995 workshop on New security paradigms
Dependability: Basic Concepts and Terminology
Dependability: Basic Concepts and Terminology
Computer Security, Fault Tolerance, and Software Assurance
IEEE Concurrency
Security and Dependability: Then and Now
CSDA '98 Proceedings of the Conference on Computer Security, Dependability, and Assurance: From Needs to Solutions
Software vulnerability analysis
Software vulnerability analysis
Establishing the business value of network security using analytical hierarchy process
Creating business value with information technology
Insecure context switching: inoculating regular expressions for survivability
WOOT'08 Proceedings of the 2nd conference on USENIX Workshop on offensive technologies
Open source vs. closed source software: towards measuring security
Proceedings of the 2009 ACM symposium on Applied Computing
Applying Generalized Non Deducibility on Compositions (GNDC) Approach in Dependability
Electronic Notes in Theoretical Computer Science (ENTCS)
Vulnerabilities and threats in distributed systems
ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
Hi-index | 0.00 |