The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Computer and Communications Security (CCS) (ccs)
2007 (conf/ccs/2007qop)

  1. Effect of static analysis tools on software security: preliminary investigation. [Citation Graph (, )][DBLP]

  2. Improving vulnerability discovery models. [Citation Graph (, )][DBLP]

  3. A technique for self-certifying tamper resistant software. [Citation Graph (, )][DBLP]

  4. Program obfuscation: a quantitative approach. [Citation Graph (, )][DBLP]

  5. Measuring up: how to keep security metrics useful and realistic. [Citation Graph (, )][DBLP]

  6. An algorithm for the appraisal of assurance indicators for complex business processes. [Citation Graph (, )][DBLP]

  7. Towards a taxonomy for information security metrics. [Citation Graph (, )][DBLP]

  8. Quantitative software security risk assessment model. [Citation Graph (, )][DBLP]

  9. Implementing and testing dynamic timeout adjustment as a dos counter-measure. [Citation Graph (, )][DBLP]

  10. Defining categories to select representative attack test-cases. [Citation Graph (, )][DBLP]

  11. AMBRA: automated model-based risk analysis. [Citation Graph (, )][DBLP]

  12. Toward measuring network security using attack graphs. [Citation Graph (, )][DBLP]

  13. Model-based assurance of security controls. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002