The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "QoP"( http://dblp.L3S.de/Venues/QoP )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ccs

Publication years (Num. hits)
2006 (12) 2007 (14) 2008 (12)
Publication types (Num. hits)
inproceedings(35) proceedings(3)
Venues (Conferences, Journals, ...)
QoP(38)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 93 occurrences of 65 keywords

Results
Found 38 publication records. Showing 38 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Karen Scarfone, Peter Mell Vulnerability scoring for security configuration settings. Search on Bibsonomy QoP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF common configuration scoring system (ccss), common vulnerability scoring system (cvss), security configuration, vulnerability scoring, risk assessment, vulnerability
1Gunnar Peterson The economics of finding and fixing vulnerabilities in distributed systems. Search on Bibsonomy QoP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF managing security
1Marcel Frigault, Lingyu Wang 0001, Anoop Singhal, Sushil Jajodia Measuring network security using dynamic bayesian network. Search on Bibsonomy QoP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, intrusion detection, security metric, attack graph
1Michael Gegick, Laurie A. Williams, Jason A. Osborne, Mladen A. Vouk Prioritizing software security fortification throughcode-level metrics. Search on Bibsonomy QoP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF attack-prone, vulnerability-prone
1Kevin Clark, Ethan Singleton, Stephen Tyree, John Hale Strata-Gem: risk assessment through mission modeling. Search on Bibsonomy QoP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF mission modeling, risk assessment
1Andy Ozment, Ketil Stølen (eds.) Proceedings of the 4th ACM Workshop on Quality of Protection, QoP 2008, Alexandria, VA, USA, October 27, 2008 Search on Bibsonomy QoP The full citation details ... 2008 DBLP  BibTeX  RDF
1Marco Domenico Aime, Andrea S. Atzeni, Paolo Carlo Pomi The risks with security metrics. Search on Bibsonomy QoP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF runtime risk analysis, security measurement
1Mariano Ceccato, Massimiliano Di Penta, Jasvir Nagra, Paolo Falcarin, Filippo Ricca, Marco Torchiano, Paolo Tonella Towards experimental evaluation of code obfuscation techniques. Search on Bibsonomy QoP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF empirical studies, software obfuscation
1Yijun Yu, Haruhiko Kaiya, Hironori Washizaki, Yingfei Xiong 0001, Zhenjiang Hu, Nobukazu Yoshioka Enforcing a security pattern in stakeholder goal models. Search on Bibsonomy QoP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF model transformations, goal models, security patterns, rbac
1Gerardo Canfora, Corrado Aaron Visaggio Does enforcing anonymity mean decreasing data usefulness? Search on Bibsonomy QoP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF data usefulness, anonymity, data privacy
1Yudistira Asnar, Nicola Zannone Perceived risk assessment. Search on Bibsonomy QoP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF subjective input, risk assessment, perceived risk
1Yonghee Shin, Laurie A. Williams Is complexity really the enemy of software security? Search on Bibsonomy QoP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF vulnerability prediction, reliability, software metrics, security metrics, software complexity, fault prediction
1Reijo Savola Towards a taxonomy for information security metrics. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF information security metrics, security assurance, network security, software security, information assurance
1Vadim Okun, William F. Guthrie, Romain Gaucher, Paul E. Black Effect of static analysis tools on software security: preliminary investigation. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF vulnerability, software security, static analysis tools
1Marco Domenico Aime, Andrea S. Atzeni, Paolo Carlo Pomi AMBRA: automated model-based risk analysis. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF computer-aided risk analysis, system modelling, security metrics
1Daniel Boteanu, Edouard Reich, José M. Fernandez 0001, John McHugh Implementing and testing dynamic timeout adjustment as a dos counter-measure. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF degradation of service, denial of service, SYN flood
1Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Deswarte Defining categories to select representative attack test-cases. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF classification, evaluation, test, intrusion detection systems, attack
1Bertrand Anckaert, Matias Madou, Bjorn De Sutter, Bruno De Bus, Koen De Bosschere, Bart Preneel Program obfuscation: a quantitative approach. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF program obfuscation, metrics, quantification
1Yolanta Beres, Adrian Baldwin, Simon Shiu Model-based assurance of security controls. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF control effectiveness, models, risk, audit, assurance
1Fabio Massacci, Artsiom Yautsiukhin An algorithm for the appraisal of assurance indicators for complex business processes. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF assurance indicator, quality of protection, security indicator, business process, hypergraphs, security metrics
1Lingyu Wang 0001, Anoop Singhal, Sushil Jajodia Toward measuring network security using attack graphs. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF intrusion detection, security metrics, attack graphs, vulnerability analysis
1Günter Karjoth, Ketil Stølen (eds.) Proceedings of the 3th ACM Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007 Search on Bibsonomy QoP The full citation details ... 2007 DBLP  BibTeX  RDF
1Hongxia Jin, Ginger Myles A technique for self-certifying tamper resistant software. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF software tamper resistance, content protection, attack tree, security measurement
1Andy Ozment Improving vulnerability discovery models. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF measuring software security, measuring vulnerabilities, vulnerability discovery model, security metrics
1Shari Lawrence Pfleeger Measuring up: how to keep security metrics useful and realistic. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security metrics, security measurement
1Idongesit Mkpong-Ruffin, David A. Umphress, John Hamilton, Juan E. Gilbert Quantitative software security risk assessment model. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF quantitative risk assessment, empirical software engineering, software security
1Jari Råman Contracting over the quality aspect of security in software product markets. Search on Bibsonomy QoP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF contracting, regulation, law, secure software development
1Jelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Roshan K. Thomas, Alefiya Hussain, Stephen Schwab, Calvin Ko Measuring denial Of service. Search on Bibsonomy QoP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF metrics, denial of service
1John McHugh Quality of protection: measuring the unmeasurable? Search on Bibsonomy QoP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF measurement, quality, speculation
1Pratyusa K. Manadhata, Jeannette M. Wing, Mark Flynn, Miles McQueen Measuring the attack surfaces of two FTP daemons. Search on Bibsonomy QoP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF attack surface, attack surface metric, security metric
1Muhammad Abedin, Syeda Nessa, Ehab Al-Shaer, Latifur Khan Vulnerability analysis For evaluating quality of protection of security policies. Search on Bibsonomy QoP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, evaluation, metric, policy
1Joseph Pamula, Sushil Jajodia, Paul Ammann, Vipin Swarup A weakest-adversary security metric for network configuration security analysis. Search on Bibsonomy QoP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF network security, vulnerability, security metric, attack graphs, exploit, quantitative measure
1Hanno Langweg Framework for malware resistance metrics. Search on Bibsonomy QoP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF software architecture, malware, resistance
1Günter Karjoth, Fabio Massacci (eds.) Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006 Search on Bibsonomy QoP The full citation details ... 2006 DBLP  BibTeX  RDF
1Gyrd Brændeland, Ketil Stølen Using model-based security analysis in component-oriented system development. Search on Bibsonomy QoP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security risk analysis, case studies
1O. Sami Saydjari Is risk a good security metric? Search on Bibsonomy QoP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, measurement, metric, management, risk analysis
1Riccardo Scandariato, Bart De Win, Wouter Joosen Towards a measuring framework for security properties of software. Search on Bibsonomy QoP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security properties, secure design
1Ho Chung, Clifford Neuman Modelling the relative strength of security protocols. Search on Bibsonomy QoP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF relative strength, cryptographic protocols, lattice, comparison
Displaying result #1 - #38 of 38 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license