Computer security: a comprehensive controls checklist
Computer security: a comprehensive controls checklist
A taxonomy of computer program security flaws
ACM Computing Surveys (CSUR)
Adversary work factor as a metric for information assurance
Proceedings of the 2000 workshop on New security paradigms
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Automated Generation and Analysis of Attack Graphs
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Fuzzy ratings for computer security evaluation.
Fuzzy ratings for computer security evaluation.
Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs
ACSAC '03 Proceedings of the 19th Annual Computer Security Applications Conference
Proceedings of the 2003 workshop on New security paradigms
Hi-index | 0.00 |
We survey existing security metrics in software architecture and software engineering. Metrics are adapted to indicate resistance of an application against local malicious software (malware) attacks. A repository of generic attacks is presented as well as the concept of resistance classes for software products.