Abstract
No abstract available.
Cited By
- Vidal F, Ivaki N and Laranjeiro N (2024). OpenSCV: an open hierarchical taxonomy for smart contract vulnerabilities, Empirical Software Engineering, 29:4, Online publication date: 1-Jul-2024.
- Dimova Y, Kode M, Kalantari S, Wuyts K, Joosen W and Mühlberg J From Privacy Policies to Privacy Threats: A Case Study in Policy-Based Threat Modeling Proceedings of the 22nd Workshop on Privacy in the Electronic Society, (17-29)
- Swambo J and Poinsot A Risk Framework for Bitcoin Custody Operation with the Revault Protocol Financial Cryptography and Data Security. FC 2021 International Workshops, (3-20)
- Knüpfer M, Bierwirth T, Stiemert L, Schopp M, Seeber S, Pöhn D and Hillmann P Cyber Taxi: A Taxonomy of Interactive Cyber Training and Education Systems Model-driven Simulation and Training Environments for Cybersecurity, (3-21)
- Hines P A Diagrammatic Approach to Information Flow in Encrypted Communication Graphical Models for Security, (166-185)
- Lallie H, Debattista K and Bal J (2020). A review of attack graph and attack tree visual syntax in cyber security, Computer Science Review, 35:C, Online publication date: 1-Feb-2020.
- Buldas A, Gadyatskaya O, Lenin A, Mauw S and Trujillo-Rasua R (2022). Attribute evaluation on attack trees with incomplete information, Computers and Security, 88:C, Online publication date: 1-Jan-2020.
- Bilur M, Gari A and Shyamasundar R Threat Assessment of Enterprise Applications via Graphical Modelling Network and System Security, (146-166)
- El-Attar M (2019). A comparative study of students and professionals in syntactical model comprehension experiments, Software and Systems Modeling (SoSyM), 18:6, (3283-3329), Online publication date: 1-Dec-2019.
- Lanet J, Bouder H, Benattou M and Legay A (2018). When time meets test, International Journal of Information Security, 17:4, (395-409), Online publication date: 1-Aug-2018.
- Lallie H, Debattista K and Bal J (2018). An Empirical Evaluation of the Effectiveness of Attack Graphs and Fault Trees in Cyber-Attack Perception, IEEE Transactions on Information Forensics and Security, 13:5, (1110-1122), Online publication date: 1-May-2018.
- Matos D, Pardal M, Adão P, Silva A and Correia M Securing Electronic Health Records in the Cloud Proceedings of the 1st Workshop on Privacy by Design in Distributed Systems, (1-6)
- Raspotnig C, Karpati P and Opdahl A (2018). Combined Assessment of Software Safety and Security Requirements, Journal of Cases on Information Technology, 20:1, (46-69), Online publication date: 1-Jan-2018.
- (2017). A survey on the usability and practical applications of Graphical Security Models, Computer Science Review, 26:C, (1-16), Online publication date: 1-Nov-2017.
- Iturbe M, Garitano I, Zurutuza U, Uribeetxeberria R and Lopez J (2017). Towards Large-Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks, Security and Communication Networks, 2017, Online publication date: 1-Jan-2017.
- El-Attar M, Luqman H, Karpati P, Sindre G and Opdahl A (2015). Extending the UML Statecharts Notation to Model Security Aspects, IEEE Transactions on Software Engineering, 41:7, (661-690), Online publication date: 1-Jul-2015.
- (2014). DAG-based attack and defense modeling, Computer Science Review, 13:C, (1-38), Online publication date: 1-Nov-2014.
- Hernandez-Ardieta J, Gonzalez-Tablas A, De Fuentes J and Ramos B (2013). A taxonomy and survey of attacks on digital signatures, Computers and Security, 34, (67-112), Online publication date: 1-May-2013.
- Raspotnig C and Opdahl A (2013). Comparing risk identification techniques for safety and security requirements, Journal of Systems and Software, 86:4, (1124-1151), Online publication date: 1-Apr-2013.
- Kordy B, Mauw S and Schweitzer P Quantitative questions on attack Proceedings of the 15th international conference on Information Security and Cryptology, (49-64)
- Roy A, Kim D and Trivedi K (2012). Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees, Security and Communication Networks, 5:8, (929-943), Online publication date: 1-Aug-2012.
- Martin N and Rice J (2011). Cybercrime, Computers and Security, 30:8, (803-814), Online publication date: 1-Nov-2011.
- Kordy B, Pouly M and Schweitzer P Computational aspects of attack---defense trees Proceedings of the 2011 international conference on Security and Intelligent Information Systems, (103-116)
- Kordy B, Mauw S, Radomirović S and Schweitzer P Foundations of attack-defense trees Proceedings of the 7th International conference on Formal aspects of security and trust, (80-95)
- Roy A, Kim D and Trivedi K Cyber security analysis using attack countermeasure trees Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, (1-4)
- Dalton G, Edge K, Mills R and Raines R (2010). Analysing security risks in computer and Radio Frequency Identification (RFID) networks using attack and protection trees, International Journal of Security and Networks, 5:2/3, (87-95), Online publication date: 1-Mar-2010.
- Jin S, Wang Y, Cui X and Yun X A review of classification methods for network vulnerability Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics, (1171-1175)
- Birge C Enhancing research into usable privacy and security Proceedings of the 27th ACM international conference on Design of communication, (221-226)
- Brinkmeier M, Rossberg M and Schaefer G Towards a denial-of-service resilient design of complex IPsec overlays Proceedings of the 2009 IEEE international conference on Communications, (948-953)
- Derrick E, Tibbs R and Reynolds L Investigating new approaches to data collection, management and analysis for network intrusion detection Proceedings of the 45th annual ACM Southeast Conference, (283-287)
- Halkidis S, Chatzigeorgiou A and Stephanides G Quantitative evaluation of systems with security patterns using a fuzzy approach Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I, (554-564)
- Kongsli V Towards agile security in web applications Companion to the 21st ACM SIGPLAN symposium on Object-oriented programming systems, languages, and applications, (805-808)
- Kim H, Shin W, Ramakrishna R and Sakurai K Design and implementation of an extended reference monitor for trusted operating systems Proceedings of the Second international conference on Information Security Practice and Experience, (235-247)
- Mouratidis H, Weiss M and Giorgini P Security patterns meet agent oriented software engineering Proceedings of the 24th international conference on Conceptual Modeling, (225-240)
- Im G and Baskerville R (2005). A longitudinal study of information system threat categories, ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 36:4, (68-79), Online publication date: 7-Oct-2005.
- Al-Hamdani W and Griskell I A proposed curriculum of cryptography courses Proceedings of the 2nd annual conference on Information security curriculum development, (4-11)
- Kim K, Hong J and Lim J Fast and secure communication resume protocol for wireless networks Proceedings of the 11th international Euro-Par conference on Parallel Processing, (1120-1129)
- van Lamsweerde A Elaborating Security Requirements by Construction of Intentional Anti-Models Proceedings of the 26th International Conference on Software Engineering, (148-157)
- Kavakli E Modeling organizational goals Proceedings of the 2004 ACM symposium on Applied computing, (1339-1343)
- Han S and Cho S (2003). Refereed Detecting intrusion with rule-based integration of multiple models, Computers and Security, 22:7, (613-623), Online publication date: 1-Oct-2003.
- Undercoffer J, Joshi A, Finin T and Pinkston J (2003). Using DAML+OIL to classify intrusive behaviours, The Knowledge Engineering Review, 18:3, (221-241), Online publication date: 1-Sep-2003.
- Da Cruz D, Rumpe B and Wimmel G Retrofitting security into a web-based information system Proceedings of the 2003 international conference on Web engineering, (301-305)
- Álvarez G and Petrović S (2003). Refereed paper, Computers and Security, 22:5, (435-449), Online publication date: 1-Jul-2003.
- McEvilley M (2002). The essence of information assurance and its implications for the Ada community, ACM SIGAda Ada Letters, XXIII:1, (35-39), Online publication date: 1-Mar-2003.
- Howard M and Lipner S (2003). Inside the Windows Security Push, IEEE Security and Privacy, 1:1, (57-61), Online publication date: 1-Jan-2003.
- McEvilley M The essence of information assurance and its implications for the Ada community Proceedings of the 2002 annual ACM SIGAda international conference on Ada: The engineering of correct and reliable software for real-time & distributed systems using Ada and related technologies, (35-39)
- Sindre G, Opdahl A and Brevik G Generalization/specialization as a structuring mechanism for misuse cases Proceedings of the 3rd Symposium on Requirements Engineering for Information Security, (1-16)
- van den Akker T, Snell Q and Clement M The YGuard access control model Proceedings of the sixth ACM symposium on Access control models and technologies, (75-84)
- Cowan C, Beattie S, Kroah-Hartman G, Pu C, Wagle P and Gligor V SubDomain: Parsimonious Server Security Proceedings of the 14th USENIX conference on System administration, (355-368)
- van Lamsweerde A and Letier E (2000). Handling Obstacles in Goal-Oriented Requirements Engineering, IEEE Transactions on Software Engineering, 26:10, (978-1005), Online publication date: 1-Oct-2000.
- van Lamsweerde A Requirements engineering in the year 00 Proceedings of the 22nd international conference on Software engineering, (5-19)
- van Lamsweerde A, Letier E and Darimont R (1998). Managing Conflicts in Goal-Driven Requirements Engineering, IEEE Transactions on Software Engineering, 24:11, (908-926), Online publication date: 1-Nov-1998.
- van Lamsweerde A and Letier E Integrating obstacles in goal-driven requirements engineering Proceedings of the 20th international conference on Software engineering, (53-62)
- Salter C, Saydjari O, Schneier B and Wallner J Toward a secure system engineering methodolgy Proceedings of the 1998 workshop on New security paradigms, (2-10)
- Chuang S and Wernick P A credibility-based model of computer system security Proceedings of the 1996 workshop on New security paradigms, (53-58)
Index Terms
- Fundamentals of computer security technology
Please enable JavaScript to view thecomments powered by Disqus.