|
Conferences in DBLP
Effect of static analysis tools on software security: preliminary investigation. [Citation Graph (, )][DBLP]
Improving vulnerability discovery models. [Citation Graph (, )][DBLP]
A technique for self-certifying tamper resistant software. [Citation Graph (, )][DBLP]
Program obfuscation: a quantitative approach. [Citation Graph (, )][DBLP]
Measuring up: how to keep security metrics useful and realistic. [Citation Graph (, )][DBLP]
An algorithm for the appraisal of assurance indicators for complex business processes. [Citation Graph (, )][DBLP]
Towards a taxonomy for information security metrics. [Citation Graph (, )][DBLP]
Quantitative software security risk assessment model. [Citation Graph (, )][DBLP]
Implementing and testing dynamic timeout adjustment as a dos counter-measure. [Citation Graph (, )][DBLP]
Defining categories to select representative attack test-cases. [Citation Graph (, )][DBLP]
AMBRA: automated model-based risk analysis. [Citation Graph (, )][DBLP]
Toward measuring network security using attack graphs. [Citation Graph (, )][DBLP]
Model-based assurance of security controls. [Citation Graph (, )][DBLP]
|