Mitigating Security Risks in Systems that Support Pervasive Services and Computing: Access-Driven Verification, Validation and Testing | 1 | 0.35 | 2007 |
Towards a Taxonomy of Vulnerabilities | 7 | 0.56 | 2007 |
Modeling Security Vulnerabilities: A Constraints and Assumptions Perspective | 4 | 0.54 | 2006 |
On Vulnerabilities, Constraints and Assumptions | 2 | 0.46 | 2005 |
Reflections on Operating in Hostile Environments | 3 | 0.56 | 2004 |