Abstract is missing.
- The economics of finding and fixing vulnerabilities in distributed systemsGunnar Peterson. 1-2 [doi]
- Vulnerability scoring for security configuration settingsKaren Scarfone, Peter Mell. 3-8 [doi]
- Enforcing a security pattern in stakeholder goal modelsYijun Yu, Haruhiko Kaiya, Hironori Washizaki, Yingfei Xiong, Zhenjiang Hu, Nobukazu Yoshioka. 9-14 [doi]
- Does enforcing anonymity mean decreasing data usefulness?Gerardo Canfora, Corrado Aaron Visaggio. 15-22 [doi]
- Measuring network security using dynamic bayesian networkMarcel Frigault, Lingyu Wang, Anoop Singhal, Sushil Jajodia. 23-30 [doi]
- Prioritizing software security fortification throughcode-level metricsMichael Gegick, Laurie Williams, Jason Osborne, Mladen A. Vouk. 31-38 [doi]
- Towards experimental evaluation of code obfuscation techniquesMariano Ceccato, Massimiliano Di Penta, Jasvir Nagra, Paolo Falcarin, Filippo Ricca, Marco Torchiano, Paolo Tonella. 39-46 [doi]
- Is complexity really the enemy of software security?Yonghee Shin, Laurie Williams. 47-50 [doi]
- Strata-Gem: risk assessment through mission modelingKevin Clark, Ethan Singleton, Stephen Tyree, John Hale. 51-58 [doi]
- Perceived risk assessmentYudistira Asnar, Nicola Zannone. 59-64 [doi]
- The risks with security metricsMarco Domenico Aime, Andrea S. Atzeni, Paolo Carlo Pomi. 65-70 [doi]