How to Own the Internet in Your Spare Time
Proceedings of the 11th USENIX Security Symposium
Who Is Liable for Insecure Systems?
Computer
Estimating Potential IT Security Losses: An Alternative Quantitative Approach
IEEE Security and Privacy
A Metrics Framework to Drive Application Security Improvement
IEEE Security and Privacy
Organization Security Metrics: Can Organizations Protect Themselves?
Information Security Journal: A Global Perspective
Secure Software Engineering: Learning from the Past to Address Future Challenges
Information Security Journal: A Global Perspective
Training ≠ education: putting secure software engineering back in the classroom
Proceedings of the 14th Western Canadian Conference on Computing Education
Information security investment decisions: evaluating the Balanced Scorecard method
International Journal of Business Information Systems
Processing multi-parameter attacktrees with estimated parameter values
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Practical security analysis of e-voting systems
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Firm objectives, IT alignment, and information security
IBM Journal of Research and Development
Security and performance in service-oriented applications: Trading off competing objectives
Decision Support Systems
Applying problem-structuring methods to problems in computer security
Proceedings of the 2011 workshop on New security paradigms workshop
Rational choice of security measures via multi-parameter attack trees
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
Cyber security exercises and competitions as a platform for cyber security experiments
NordSec'12 Proceedings of the 17th Nordic conference on Secure IT Systems
Cyber-risk decision models: To insure IT or not?
Decision Support Systems
Aggregating vulnerability metrics in enterprise networks using attack graphs
Journal of Computer Security
Hi-index | 0.00 |
Although most businesses say information security is a primary concern, few have adequate systems in place because securing information requires a risk-management approach with dependable, quantifiable metrics.