Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security
IEEE Transactions on Software Engineering
A review of information security issues and respective research contributions
ACM SIGMIS Database
NSPW '09 Proceedings of the 2009 workshop on New security paradigms workshop
FAST'06 Proceedings of the 4th international conference on Formal aspects in security and trust
Optimizing the decision to expel attackers from an information system
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Computers and Electrical Engineering
Adversary-driven state-based system security evaluation
Proceedings of the 6th International Workshop on Security Measurements and Metrics
A service dependency model for cost-sensitive intrusion response
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Rule-based topological vulnerability analysis
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Network vulnerability analysis through vulnerability take-grant model (VTG)
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
A methodology and supporting techniques for the quantitative assessment of insider threats
Proceedings of the 2nd International Workshop on Dependability Issues in Cloud Computing
Hi-index | 0.01 |