Abstract is missing.
- Effect of static analysis tools on software security: preliminary investigationVadim Okun, William F. Guthrie, Romain Gaucher, Paul E. Black. 1-5 [doi]
- Improving vulnerability discovery modelsAndy Ozment. 6-11 [doi]
- A technique for self-certifying tamper resistant softwareHongxia Jin, Ginger Myles. 12-14 [doi]
- Program obfuscation: a quantitative approachBertrand Anckaert, Matias Madou, Bjorn De Sutter, Bruno De Bus, Koen De Bosschere, Bart Preneel. 15-20 [doi]
- Measuring up: how to keep security metrics useful and realisticShari Lawrence Pfleeger. 21 [doi]
- An algorithm for the appraisal of assurance indicators for complex business processesFabio Massacci, Artsiom Yautsiukhin. 22-27 [doi]
- Towards a taxonomy for information security metricsReijo Savola. 28-30 [doi]
- Quantitative software security risk assessment modelIdongesit Mkpong-Ruffin, David A. Umphress, John Hamilton, Juan Gilbert. 31-33 [doi]
- Implementing and testing dynamic timeout adjustment as a dos counter-measureDaniel Boteanu, Edouard Reich, José M. Fernandez, John McHugh. 34-39 [doi]
- Defining categories to select representative attack test-casesMohammed S. Gadelrab, Anas Abou El Kalam, Yves Deswarte. 40-42 [doi]
- AMBRA: automated model-based risk analysisMarco Domenico Aime, Andrea S. Atzeni, Paolo Carlo Pomi. 43-48 [doi]
- Toward measuring network security using attack graphsLingyu Wang, Anoop Singhal, Sushil Jajodia. 49-54 [doi]
- Model-based assurance of security controlsYolanta Beres, Adrian Baldwin, Simon Shiu. 55 [doi]