|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 93 occurrences of 65 keywords
|
|
|
Results
Found 38 publication records. Showing 38 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Karen Scarfone, Peter Mell |
Vulnerability scoring for security configuration settings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 4th ACM Workshop on Quality of Protection, QoP 2008, Alexandria, VA, USA, October 27, 2008, pp. 3-8, 2008, ACM, 978-1-60558-321-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
common configuration scoring system (ccss), common vulnerability scoring system (cvss), security configuration, vulnerability scoring, risk assessment, vulnerability |
1 | Gunnar Peterson |
The economics of finding and fixing vulnerabilities in distributed systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 4th ACM Workshop on Quality of Protection, QoP 2008, Alexandria, VA, USA, October 27, 2008, pp. 1-2, 2008, ACM, 978-1-60558-321-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
managing security |
1 | Marcel Frigault, Lingyu Wang 0001, Anoop Singhal, Sushil Jajodia |
Measuring network security using dynamic bayesian network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 4th ACM Workshop on Quality of Protection, QoP 2008, Alexandria, VA, USA, October 27, 2008, pp. 23-30, 2008, ACM, 978-1-60558-321-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, intrusion detection, security metric, attack graph |
1 | Michael Gegick, Laurie A. Williams, Jason A. Osborne, Mladen A. Vouk |
Prioritizing software security fortification throughcode-level metrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 4th ACM Workshop on Quality of Protection, QoP 2008, Alexandria, VA, USA, October 27, 2008, pp. 31-38, 2008, ACM, 978-1-60558-321-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
attack-prone, vulnerability-prone |
1 | Kevin Clark, Ethan Singleton, Stephen Tyree, John Hale |
Strata-Gem: risk assessment through mission modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 4th ACM Workshop on Quality of Protection, QoP 2008, Alexandria, VA, USA, October 27, 2008, pp. 51-58, 2008, ACM, 978-1-60558-321-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
mission modeling, risk assessment |
1 | Andy Ozment, Ketil Stølen (eds.) |
Proceedings of the 4th ACM Workshop on Quality of Protection, QoP 2008, Alexandria, VA, USA, October 27, 2008 ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![ACM, 978-1-60558-321-1 The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
1 | Marco Domenico Aime, Andrea S. Atzeni, Paolo Carlo Pomi |
The risks with security metrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 4th ACM Workshop on Quality of Protection, QoP 2008, Alexandria, VA, USA, October 27, 2008, pp. 65-70, 2008, ACM, 978-1-60558-321-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
runtime risk analysis, security measurement |
1 | Mariano Ceccato, Massimiliano Di Penta, Jasvir Nagra, Paolo Falcarin, Filippo Ricca, Marco Torchiano, Paolo Tonella |
Towards experimental evaluation of code obfuscation techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 4th ACM Workshop on Quality of Protection, QoP 2008, Alexandria, VA, USA, October 27, 2008, pp. 39-46, 2008, ACM, 978-1-60558-321-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
empirical studies, software obfuscation |
1 | Yijun Yu, Haruhiko Kaiya, Hironori Washizaki, Yingfei Xiong 0001, Zhenjiang Hu, Nobukazu Yoshioka |
Enforcing a security pattern in stakeholder goal models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 4th ACM Workshop on Quality of Protection, QoP 2008, Alexandria, VA, USA, October 27, 2008, pp. 9-14, 2008, ACM, 978-1-60558-321-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
model transformations, goal models, security patterns, rbac |
1 | Gerardo Canfora, Corrado Aaron Visaggio |
Does enforcing anonymity mean decreasing data usefulness? ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 4th ACM Workshop on Quality of Protection, QoP 2008, Alexandria, VA, USA, October 27, 2008, pp. 15-22, 2008, ACM, 978-1-60558-321-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
data usefulness, anonymity, data privacy |
1 | Yudistira Asnar, Nicola Zannone |
Perceived risk assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 4th ACM Workshop on Quality of Protection, QoP 2008, Alexandria, VA, USA, October 27, 2008, pp. 59-64, 2008, ACM, 978-1-60558-321-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
subjective input, risk assessment, perceived risk |
1 | Yonghee Shin, Laurie A. Williams |
Is complexity really the enemy of software security? ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 4th ACM Workshop on Quality of Protection, QoP 2008, Alexandria, VA, USA, October 27, 2008, pp. 47-50, 2008, ACM, 978-1-60558-321-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
vulnerability prediction, reliability, software metrics, security metrics, software complexity, fault prediction |
1 | Reijo Savola |
Towards a taxonomy for information security metrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 3th ACM Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007, pp. 28-30, 2007, ACM, 978-1-59593-885-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
information security metrics, security assurance, network security, software security, information assurance |
1 | Vadim Okun, William F. Guthrie, Romain Gaucher, Paul E. Black |
Effect of static analysis tools on software security: preliminary investigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 3th ACM Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007, pp. 1-5, 2007, ACM, 978-1-59593-885-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
vulnerability, software security, static analysis tools |
1 | Marco Domenico Aime, Andrea S. Atzeni, Paolo Carlo Pomi |
AMBRA: automated model-based risk analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 3th ACM Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007, pp. 43-48, 2007, ACM, 978-1-59593-885-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
computer-aided risk analysis, system modelling, security metrics |
1 | Daniel Boteanu, Edouard Reich, José M. Fernandez 0001, John McHugh |
Implementing and testing dynamic timeout adjustment as a dos counter-measure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 3th ACM Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007, pp. 34-39, 2007, ACM, 978-1-59593-885-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
degradation of service, denial of service, SYN flood |
1 | Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Deswarte |
Defining categories to select representative attack test-cases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 3th ACM Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007, pp. 40-42, 2007, ACM, 978-1-59593-885-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
classification, evaluation, test, intrusion detection systems, attack |
1 | Bertrand Anckaert, Matias Madou, Bjorn De Sutter, Bruno De Bus, Koen De Bosschere, Bart Preneel |
Program obfuscation: a quantitative approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 3th ACM Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007, pp. 15-20, 2007, ACM, 978-1-59593-885-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
program obfuscation, metrics, quantification |
1 | Yolanta Beres, Adrian Baldwin, Simon Shiu |
Model-based assurance of security controls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 3th ACM Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007, pp. 55, 2007, ACM, 978-1-59593-885-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
control effectiveness, models, risk, audit, assurance |
1 | Fabio Massacci, Artsiom Yautsiukhin |
An algorithm for the appraisal of assurance indicators for complex business processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 3th ACM Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007, pp. 22-27, 2007, ACM, 978-1-59593-885-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
assurance indicator, quality of protection, security indicator, business process, hypergraphs, security metrics |
1 | Lingyu Wang 0001, Anoop Singhal, Sushil Jajodia |
Toward measuring network security using attack graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 3th ACM Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007, pp. 49-54, 2007, ACM, 978-1-59593-885-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
intrusion detection, security metrics, attack graphs, vulnerability analysis |
1 | Günter Karjoth, Ketil Stølen (eds.) |
Proceedings of the 3th ACM Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007 ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![ACM, 978-1-59593-885-5 The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
1 | Hongxia Jin, Ginger Myles |
A technique for self-certifying tamper resistant software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 3th ACM Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007, pp. 12-14, 2007, ACM, 978-1-59593-885-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
software tamper resistance, content protection, attack tree, security measurement |
1 | Andy Ozment |
Improving vulnerability discovery models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 3th ACM Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007, pp. 6-11, 2007, ACM, 978-1-59593-885-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
measuring software security, measuring vulnerabilities, vulnerability discovery model, security metrics |
1 | Shari Lawrence Pfleeger |
Measuring up: how to keep security metrics useful and realistic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 3th ACM Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007, pp. 21, 2007, ACM, 978-1-59593-885-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security metrics, security measurement |
1 | Idongesit Mkpong-Ruffin, David A. Umphress, John Hamilton, Juan E. Gilbert |
Quantitative software security risk assessment model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 3th ACM Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007, pp. 31-33, 2007, ACM, 978-1-59593-885-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
quantitative risk assessment, empirical software engineering, software security |
1 | Jari Råman |
Contracting over the quality aspect of security in software product markets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006, pp. 19-26, 2006, ACM, 1-59593-553-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
contracting, regulation, law, secure software development |
1 | Jelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Roshan K. Thomas, Alefiya Hussain, Stephen Schwab, Calvin Ko |
Measuring denial Of service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006, pp. 53-58, 2006, ACM, 1-59593-553-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
metrics, denial of service |
1 | John McHugh |
Quality of protection: measuring the unmeasurable? ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006, pp. 1-2, 2006, ACM, 1-59593-553-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
measurement, quality, speculation |
1 | Pratyusa K. Manadhata, Jeannette M. Wing, Mark Flynn, Miles McQueen |
Measuring the attack surfaces of two FTP daemons. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006, pp. 3-10, 2006, ACM, 1-59593-553-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
attack surface, attack surface metric, security metric |
1 | Muhammad Abedin, Syeda Nessa, Ehab Al-Shaer, Latifur Khan |
Vulnerability analysis For evaluating quality of protection of security policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006, pp. 49-52, 2006, ACM, 1-59593-553-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, evaluation, metric, policy |
1 | Joseph Pamula, Sushil Jajodia, Paul Ammann, Vipin Swarup |
A weakest-adversary security metric for network configuration security analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006, pp. 31-38, 2006, ACM, 1-59593-553-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
network security, vulnerability, security metric, attack graphs, exploit, quantitative measure |
1 | Hanno Langweg |
Framework for malware resistance metrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006, pp. 39-44, 2006, ACM, 1-59593-553-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
software architecture, malware, resistance |
1 | Günter Karjoth, Fabio Massacci (eds.) |
Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006 ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![ACM, 1-59593-553-3 The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
1 | Gyrd Brændeland, Ketil Stølen |
Using model-based security analysis in component-oriented system development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006, pp. 11-18, 2006, ACM, 1-59593-553-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security risk analysis, case studies |
1 | O. Sami Saydjari |
Is risk a good security metric? ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006, pp. 59-60, 2006, ACM, 1-59593-553-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, measurement, metric, management, risk analysis |
1 | Riccardo Scandariato, Bart De Win, Wouter Joosen |
Towards a measuring framework for security properties of software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006, pp. 27-30, 2006, ACM, 1-59593-553-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security properties, secure design |
1 | Ho Chung, Clifford Neuman |
Modelling the relative strength of security protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006, pp. 45-48, 2006, ACM, 1-59593-553-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
relative strength, cryptographic protocols, lattice, comparison |
Displaying result #1 - #38 of 38 (100 per page; Change: )
|
|