Towards a Classification of Security Metrics (original) (raw)

Significance of Security Metrics in Secure Software Development

Shams Siddiqui

International Journal of Applied Information Systems, 2017

View PDFchevron_right

Integrated security analysis

Kevin Tomsovic

View PDFchevron_right

Multi-aspect security configuration assessment

Roy Campbell

Proceedings of the 2nd ACM workshop on Assurable and usable security configuration, 2009

View PDFchevron_right

Experimenting with quantitative evaluation tools for monitoring operational security

Mohamed Kaaniche

IEEE Transactions on Software Engineering, 1999

View PDFchevron_right

New Non Path Metrics for Evaluating Network Security Based on Vulnerability

Tito W Purboyo

View PDFchevron_right

From Security Protocols to Systems Security

Brian Monahan

Lecture Notes in Computer Science, 2005

View PDFchevron_right

A “Cookbook” for Vulnerability Research

Armando Valdés Velásquez

Frontiers in Public Health, 2019

View PDFchevron_right

The Battle Against Security Attacks

Katina Michael

2002

View PDFchevron_right

Attack surface definitions: A systematic literature review

Mahran Al-Zyoud

Information and Software Technology, 2018

View PDFchevron_right

Network Security: Vulnerabilities and Disclosure Policy*

Chaim Fershtman

The Journal of Industrial Economics, 2010

View PDFchevron_right

Models and tools for quantitative assessment of operational security

Mohamed Kaaniche

1996

View PDFchevron_right

Quantitative assessment of operational security: Models and tools

Mohamed Kaaniche

1996

View PDFchevron_right

Security Projects for Systems and Networking Professionals

Hamid Arabnia

Emerging Trends in ICT Security, 2014

View PDFchevron_right

Mapping software faults with web security vulnerabilities

José Fonseca

Proceedings of the International Conference on Dependable Systems and Networks, 2008

View PDFchevron_right

Web Application Vulnerabilities: A Survey

Himanshu Yadav

International Journal of Computer Applications, 2014

View PDFchevron_right

Software vulnerability analysis

Ivan Krsul

1998

View PDFchevron_right

Usable Security: A Systematic Literature Review

Giorgia Tempestini

Information, 2023

View PDFchevron_right

Computer and Network Security [Working Title]

Jaydip Sen

2019

View PDFchevron_right

A call for evidence-based security tools

Gershon Ben-Shakhar

2009

View PDFchevron_right

International Working Group on Assurance Cases (for Security)

Sofia Guerra

IEEE Security & Privacy Magazine, 2006

View PDFchevron_right

Different Aspects of Cloud Security

Riidhei Malhotra

ijera.com

View PDFchevron_right

Optimization of Safeguards Effort

N. Nakicenovic

1973

View PDFchevron_right

How to Specify Security Services: A Practical Approach

José L. Vivas

Lecture Notes in Computer Science, 2003

View PDFchevron_right

Privacy Versus Security in the Internet Era

Razvan Serbu

Procedia Economics and Finance, 2015

View PDFchevron_right

Security-related vulnerability life cycle analysis

Mohamed Kaaniche

2012

View PDFchevron_right

Web Services Security: Threats and Challenges

Prof. L. Udaya Kumar

International Journal of Computer Applications, 2015

View PDFchevron_right

High-level specification of security systems

José L. Vivas

GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489)

View PDFchevron_right

Incorporating Security Requirements Into the Software Development Process

Theodoros Balopoulos

European Conference on Information Warfare and Security, 2005

View PDFchevron_right

Modelling and Deploying Security Policies

Ruben Parra Alonso

Proceedings of the Fifth International Conference on Web Information Systems and Technologies, 2009

View PDFchevron_right

An Analysis of Cloud Security

IRJET Journal

View PDFchevron_right

Approaches to human security

SUNITA TARAI

View PDFchevron_right

Security and Privacy Assurance Research (SPAR) Pilot Final Report

Uri Blumenthal

2015

View PDFchevron_right

Analysis of Information System Threats

Inomjon Yarashov

2021

View PDFchevron_right

Advances in Security in Computing and Communications

MUFTAH FRAIFER

Advances in Security in Computing and Communications

View PDFchevron_right

Anticipating the unintended consequences of security dynamics

Len Malczynski

2010

View PDFchevron_right