The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Computer and Communications Security (CCS) (ccs)
2006 (conf/ccs/2006qop)


  1. Quality of protection: measuring the unmeasurable? [Citation Graph (, )][DBLP]


  2. Measuring the attack surfaces of two FTP daemons. [Citation Graph (, )][DBLP]


  3. Using model-based security analysis in component-oriented system development. [Citation Graph (, )][DBLP]


  4. Contracting over the quality aspect of security in software product markets. [Citation Graph (, )][DBLP]


  5. Towards a measuring framework for security properties of software. [Citation Graph (, )][DBLP]


  6. A weakest-adversary security metric for network configuration security analysis. [Citation Graph (, )][DBLP]


  7. Framework for malware resistance metrics. [Citation Graph (, )][DBLP]


  8. Modelling the relative strength of security protocols. [Citation Graph (, )][DBLP]


  9. Vulnerability analysis For evaluating quality of protection of security policies. [Citation Graph (, )][DBLP]


  10. Measuring denial Of service. [Citation Graph (, )][DBLP]


  11. Is risk a good security metric? [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002