Writing Secure Code
Exploiting Software: How to Break Code
Exploiting Software: How to Break Code
IEEE Security and Privacy
Building Secure Software: How to Avoid Security Problems the Right Way (paperback) (Addison-Wesley Professional Computing Series)
IEEE Security and Privacy
IEEE Security and Privacy
IEEE Security and Privacy
Web services enterprise security architecture: a case study
Proceedings of the 2005 workshop on Secure web services
Extending XP practices to support security requirements engineering
Proceedings of the 2006 international workshop on Software engineering for secure systems
Stakeholder Value Driven Threat Modeling for Off the Shelf Based Systems
ICSE COMPANION '07 Companion to the proceedings of the 29th International Conference on Software Engineering
Optimizing Investments in Security Countermeasures: A Practical Tool for Fixed Budgets
IEEE Security and Privacy
Quantitative software security risk assessment model
Proceedings of the 2007 ACM workshop on Quality of protection
Secure Software Engineering: Learning from the Past to Address Future Challenges
Information Security Journal: A Global Perspective
Identifying vulnerabilities and critical requirements using criminal court proceedings
Proceedings of the 2009 ACM symposium on Applied Computing
Evaluating quality of web services: a risk-driven approach
BIS'07 Proceedings of the 10th international conference on Business information systems
Risk management for service-oriented systems
ICWE'07 Proceedings of the 7th international conference on Web engineering
A semantic paradigm for component-based specification integrating a notion of security risk
FAST'06 Proceedings of the 4th international conference on Formal aspects in security and trust
Discovering Multidimensional Correlations among Regulatory Requirements to Understand Risk
ACM Transactions on Software Engineering and Methodology (TOSEM)
Web services and incerta spiriti: a game theoretic approach to uncertainty
ECSQARU'11 Proceedings of the 11th European conference on Symbolic and quantitative approaches to reasoning with uncertainty
TAM2: automated threat analysis
Proceedings of the 27th Annual ACM Symposium on Applied Computing
SSL VPNs: SSL VPN and return on investment: A possible combination
Network Security
A Six-View Perspective Framework for System Security: Issues, Risks, and Requirements
International Journal of Information Security and Privacy
Countermeasure graphs for software security risk assessment: An action research
Journal of Systems and Software
Hi-index | 0.00 |
Software development is all about making software do something: when software vendors sell their products, they talk about what the particular products do to make customer's lives easier, such as improving business processes or something similarly positive. Following this trend, most systems for designing software also tend to describe positive features.