Sign in
QoP
2006
2007
2008
2006
2008
Keyphrases
Publications
2008
Karen Scarfone
,
Peter Mell
Vulnerability scoring for security configuration settings.
QoP
(2008)
Gunnar Peterson
The economics of finding and fixing vulnerabilities in distributed systems.
QoP
(2008)
Marcel Frigault
,
Lingyu Wang
,
Anoop Singhal
,
Sushil Jajodia
Measuring network security using dynamic bayesian network.
QoP
(2008)
Michael Gegick
,
Laurie A. Williams
,
Jason A. Osborne
,
Mladen A. Vouk
Prioritizing software security fortification throughcode-level metrics.
QoP
(2008)
Kevin Clark
,
Ethan Singleton
,
Stephen Tyree
,
John Hale
Strata-Gem: risk assessment through mission modeling.
QoP
(2008)
Proceedings of the 4th ACM Workshop on Quality of Protection, QoP 2008, Alexandria, VA, USA, October 27, 2008
QoP
(2008)
Marco Domenico Aime
,
Andrea S. Atzeni
,
Paolo Carlo Pomi
The risks with security metrics.
QoP
(2008)
Mariano Ceccato
,
Massimiliano Di Penta
,
Jasvir Nagra
,
Paolo Falcarin
,
Filippo Ricca
,
Marco Torchiano
,
Paolo Tonella
Towards experimental evaluation of code obfuscation techniques.
QoP
(2008)
Yijun Yu
,
Haruhiko Kaiya
,
Hironori Washizaki
,
Yingfei Xiong
,
Zhenjiang Hu
,
Nobukazu Yoshioka
Enforcing a security pattern in stakeholder goal models.
QoP
(2008)
Gerardo Canfora
,
Corrado Aaron Visaggio
Does enforcing anonymity mean decreasing data usefulness?
QoP
(2008)
Yudistira Asnar
,
Nicola Zannone
Perceived risk assessment.
QoP
(2008)
Yonghee Shin
,
Laurie A. Williams
Is complexity really the enemy of software security?
QoP
(2008)
2007
Reijo Savola
Towards a taxonomy for information security metrics.
QoP
(2007)
Vadim Okun
,
William F. Guthrie
,
Romain Gaucher
,
Paul E. Black
Effect of static analysis tools on software security: preliminary investigation.
QoP
(2007)
Marco Domenico Aime
,
Andrea S. Atzeni
,
Paolo Carlo Pomi
AMBRA: automated model-based risk analysis.
QoP
(2007)
Daniel Boteanu
,
Edouard Reich
,
José M. Fernandez
,
John McHugh
Implementing and testing dynamic timeout adjustment as a dos counter-measure.
QoP
(2007)
Mohammed S. Gadelrab
,
Anas Abou El Kalam
,
Yves Deswarte
Defining categories to select representative attack test-cases.
QoP
(2007)
Bertrand Anckaert
,
Matias Madou
,
Bjorn De Sutter
,
Bruno De Bus
,
Koen De Bosschere
,
Bart Preneel
Program obfuscation: a quantitative approach.
QoP
(2007)
Yolanta Beres
,
Adrian Baldwin
,
Simon Shiu
Model-based assurance of security controls.
QoP
(2007)
Fabio Massacci
,
Artsiom Yautsiukhin
An algorithm for the appraisal of assurance indicators for complex business processes.
QoP
(2007)
Lingyu Wang
,
Anoop Singhal
,
Sushil Jajodia
Toward measuring network security using attack graphs.
QoP
(2007)
Proceedings of the 3th ACM Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007
QoP
(2007)
Hongxia Jin
,
Ginger Myles
A technique for self-certifying tamper resistant software.
QoP
(2007)
Andy Ozment
Improving vulnerability discovery models.
QoP
(2007)
Shari Lawrence Pfleeger
Measuring up: how to keep security metrics useful and realistic.
QoP
(2007)
Idongesit Mkpong-Ruffin
,
David A. Umphress
,
John Hamilton
,
Juan E. Gilbert
Quantitative software security risk assessment model.
QoP
(2007)
2006
Jari Råman
Contracting over the quality aspect of security in software product markets.
QoP
(2006)
Jelena Mirkovic
,
Peter L. Reiher
,
Sonia Fahmy
,
Roshan K. Thomas
,
Alefiya Hussain
,
Stephen Schwab
,
Calvin Ko
Measuring denial Of service.
QoP
(2006)
John McHugh
Quality of protection: measuring the unmeasurable?
QoP
(2006)
Pratyusa K. Manadhata
,
Jeannette M. Wing
,
Mark Flynn
,
Miles McQueen
Measuring the attack surfaces of two FTP daemons.
QoP
(2006)
Muhammad Abedin
,
Syeda Nessa
,
Ehab Al-Shaer
,
Latifur Khan
Vulnerability analysis For evaluating quality of protection of security policies.
QoP
(2006)
Joseph Pamula
,
Sushil Jajodia
,
Paul Ammann
,
Vipin Swarup
A weakest-adversary security metric for network configuration security analysis.
QoP
(2006)
Hanno Langweg
Framework for malware resistance metrics.
QoP
(2006)
Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006
QoP
(2006)
Gyrd Brændeland
,
Ketil Stølen
Using model-based security analysis in component-oriented system development.
QoP
(2006)
O. Sami Saydjari
Is risk a good security metric?
QoP
(2006)
Riccardo Scandariato
,
Bart De Win
,
Wouter Joosen
Towards a measuring framework for security properties of software.
QoP
(2006)
Ho Chung
,
Clifford Neuman
Modelling the relative strength of security protocols.
QoP
(2006)