Investigating Personal Determinants Of Phishing And The Effect Of National Culture | 5 | 0.41 | 2015 |
Investigating the Correlation between Intention and Action in the Context of Social Engineering in Two Different National Cultures | 1 | 0.35 | 2015 |
Requirements engineering: The quest for the dependent variable | 1 | 0.36 | 2015 |
P2CySeMoL: Predictive, Probabilistic Cyber Security Modeling Language. | 0 | 0.34 | 2015 |
Automatic data collection for enterprise architecture models | 13 | 0.69 | 2014 |
The Distribution of Time to Recovery of Enterprise IT Services | 8 | 0.72 | 2014 |
An Empirical Investigation of the Effect of Target-Related Information in Phishing Attacks | 0 | 0.34 | 2014 |
Indicators of expert judgement and their significance: an empirical investigation in the area of cyber security | 1 | 0.37 | 2014 |
A Large-Scale Study of the Time Required to Compromise a Computer System | 8 | 0.45 | 2014 |
Signature Based Intrusion Detection for Zero-Day Attacks: (Not) A Closed Chapter? | 9 | 0.54 | 2014 |
Using phishing experiments and scenario-based surveys to understand security behaviours in practice. | 8 | 0.46 | 2013 |
Using enterprise architecture analysis and interview data to estimate service response time | 10 | 0.53 | 2013 |
Effort Estimates on Web Application Vulnerability Discovery | 3 | 0.42 | 2013 |
Estimates on the effectiveness of web application firewalls against targeted attacks. | 0 | 0.34 | 2013 |
Using enterprise architecture and technology adoption models to predict application usage | 10 | 0.50 | 2012 |
Success Rate of Remote Code Execution Attacks - Expert Assessments and Observations. | 5 | 0.53 | 2012 |
Performance of automated network vulnerability scanning at remediating security issues | 7 | 0.66 | 2012 |
Empirical Analysis of System-Level Vulnerability Metrics through Actual Attacks | 20 | 0.94 | 2012 |
Identifying factors affecting software development cost and productivity | 9 | 0.47 | 2012 |
A Metamodel for Web Application Injection Attacks and Countermeasures. | 4 | 0.42 | 2012 |
Effort Estimates for Vulnerability Discovery Projects | 3 | 0.40 | 2012 |
Estimates of success rates of remote arbitrary code execution attacks. | 3 | 0.44 | 2012 |
Expert Assessment On The Probability Of Successful Remote Code Execution Attacks | 2 | 0.40 | 2011 |
Security mistakes in information system deployment projects | 4 | 0.51 | 2011 |
A quantitative evaluation of vulnerability scanning. | 15 | 0.87 | 2011 |
Estimates of Success Rates of Denial-of-Service Attacks | 1 | 0.36 | 2011 |
A Tool for Automatic Enterprise Architecture Modeling. | 20 | 1.05 | 2011 |
Data accuracy assessment using enterprise architecture | 21 | 0.72 | 2011 |