On the functional relation between security and dependability impairments
Proceedings of the 1999 workshop on New security paradigms
System Health and Intrusion Monitoring Using a Hierarchy of Constraints
RAID '00 Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection
Intrusion Tolerance in Distributed Middleware
Information Systems Frontiers
A Machine-Oriented Vulnerability Database for Automated Vulnerability Detection and Processing
LISA '04 Proceedings of the 18th USENIX conference on System administration
Matching attack patterns to security vulnerabilities in software-intensive system designs
SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
On the design of more secure software-intensive systems by use of attack patterns
Information and Software Technology
Improving vulnerability discovery models
Proceedings of the 2007 ACM workshop on Quality of protection
Application of autonomic agents for global information grid management and security
Proceedings of the 2007 Summer Computer Simulation Conference
Prioritizing software security fortification throughcode-level metrics
Proceedings of the 4th ACM workshop on Quality of protection
Is complexity really the enemy of software security?
Proceedings of the 4th ACM workshop on Quality of protection
Classification of Component Vulnerabilities in Java Service Oriented Programming (SOP) Platforms
CBSE '08 Proceedings of the 11th International Symposium on Component-Based Software Engineering
Secure Software Engineering: Learning from the Past to Address Future Challenges
Information Security Journal: A Global Perspective
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
ESSoS '09 Proceedings of the 1st International Symposium on Engineering Secure Software and Systems
Toward Non-security Failures as a Predictor of Security Faults and Failures
ESSoS '09 Proceedings of the 1st International Symposium on Engineering Secure Software and Systems
Common Criteria Approach to J2ME CLDC Security Requirements
Proceedings of the 2006 conference on New Trends in Software Methodologies, Tools and Techniques: Proceedings of the fifth SoMeT_06
The life and death of statically detected vulnerabilities: An empirical study
Information and Software Technology
A review of classification methods for network vulnerability
SMC'09 Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics
Learning unknown attacks - a start
RAID'02 Proceedings of the 5th international conference on Recent advances in intrusion detection
Attacks against computer network: formal grammar-based framework and simulation tool
RAID'02 Proceedings of the 5th international conference on Recent advances in intrusion detection
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Vulnerability categorization using Bayesian networks
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
A taxonomy of vulnerabilities in implantable medical devices
Proceedings of the second annual workshop on Security and privacy in medical and home-care systems
Building components with embedded security monitors
Proceedings of the joint ACM SIGSOFT conference -- QoSA and ACM SIGSOFT symposium -- ISARCS on Quality of software architectures -- QoSA and architecting critical systems -- ISARCS
Building security requirements using state transition diagram at security threat location
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
A theoretical model for the average impact of attacks on billing infrastructures
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Behavior-based model of detection and prevention of intrusions in computer networks
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
An idea of an independent validation of vulnerability discovery models
ESSoS'12 Proceedings of the 4th international conference on Engineering Secure Software and Systems
OSDC: adapting ODC for developing more secure software
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Vulnerability of the day: concrete demonstrations for software engineering undergraduates
Proceedings of the 2013 International Conference on Software Engineering
Hi-index | 0.00 |