Fraud detection via regression analysis
Computers and Security
Communications of the ACM
Security Strength Measurement for Dongle-Protected Software
IEEE Security and Privacy
Journal of Systems and Software
Understanding the Value of Countermeasure Portfolios in Information Systems Security
Journal of Management Information Systems
Using security metrics coupled with predictive modeling and simulation to assess security processes
ESEM '09 Proceedings of the 2009 3rd International Symposium on Empirical Software Engineering and Measurement
Quantified security is a weak hypothesis: a critical survey of results and assumptions
NSPW '09 Proceedings of the 2009 workshop on New security paradigms workshop
Cybersecurity for critical infrastructures: attack and defense modeling
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Information and Software Technology
Systematic security assessment at an early processor design stage
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
Information Resources Management Journal
Hi-index | 0.00 |
Security risk models have successfully estimated the likelihood of attack for simple security threats such as burglary and auto theft. Before we can forecast the risks to computer systems, we must first learn to measure the strength of their security.