Risk-driven security metrics for an Android smartphone application. | 0 | 0.34 | 2020 |
Current Level Of Cybersecurity Competence And Future Development - Case Finland | 0 | 0.34 | 2017 |
Mitigating IoT security threats with a trusted Network element | 1 | 0.41 | 2016 |
Towards security metrics-supported IP traceback. | 0 | 0.34 | 2016 |
Architecture for High Confidence Cloud Security Monitoring | 2 | 0.38 | 2015 |
Security objectives, controls and metrics development for an Android smartphone application | 0 | 0.34 | 2014 |
Security Measuring for Self-adaptive Security | 0 | 0.34 | 2014 |
Quality of security metrics and measurements | 14 | 0.89 | 2013 |
Metrics-driven security objective decomposition for an e-health application with adaptive security management | 12 | 0.58 | 2013 |
Toward risk-driven security measurement for Android smartphone platforms. | 2 | 0.41 | 2013 |
Security risks in the short-range communication of ubiquitous application | 0 | 0.34 | 2013 |
Requirements of secure WSN-MCN edge router | 2 | 0.82 | 2013 |
Taxonomy of quality metrics for assessing assurance of security correctness | 7 | 0.62 | 2013 |
A Risk-Driven Security Analysis And Metrics Development For Wsn-Mcn Router | 1 | 0.37 | 2013 |
Risk-Driven Security Metrics in Agile Software Development - An Industrial Pilot Study. | 5 | 0.63 | 2012 |
Metrics driven security management framework for e-health digital ecosystem focusing on chronic diseases | 0 | 0.34 | 2012 |
Towards metrics-driven adaptive security management in e-health IoT applications. | 10 | 0.75 | 2012 |
Strategies For Security Measurement Objective Decomposition | 4 | 0.59 | 2012 |
A Visualization and Modeling Tool for Security Metrics and Measurements Management. | 9 | 0.78 | 2011 |
Towards security effectiveness measurement utilizing risk-based security assurance | 5 | 0.57 | 2010 |
User Experience and Security in the Cloud -- An Empirical Study in the Finnish Cloud Consortium | 7 | 0.47 | 2010 |
Applicability of security metrics for adaptive security management in a universal banking hub system | 6 | 0.46 | 2010 |
Security-Measurability-Enhancing Mechanisms for a Distributed Adaptive Security Monitoring System | 12 | 0.75 | 2010 |
Towards an abstraction layer for security assurance measurements: (invited paper) | 6 | 0.57 | 2010 |
Future Internet - FIS 2009, Second Future Internet Symposium, FIS 2009, Berlin, Germany, September 1-3, 2009 | 8 | 0.82 | 2010 |
Trust and Cloud Services - An Interview Study | 9 | 0.59 | 2010 |
Towards a Risk-Driven Methodology for Privacy Metrics Development | 3 | 0.50 | 2010 |
First International Workshop on Measurability of Security in Software Architectures -- MeSSa 2010 | 0 | 0.34 | 2010 |
Identification of Basic Measurable Security Components for a Distributed Messaging System | 15 | 1.09 | 2009 |
Identification of Basic Measurable Security Components in Software-Intensive Systems. | 0 | 0.34 | 2009 |
Node Level Security Management and Authentication in Mobile Ad Hoc Networks | 2 | 0.37 | 2009 |
Development Of Security Metrics Based On Decomposition Of Security Requirements And Ontologies | 0 | 0.34 | 2009 |
A Security Metrics Taxonomization Model For Software-Intensive Systems | 21 | 1.58 | 2009 |
The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece | 50 | 4.37 | 2009 |
A Secure Running Environment For Multiple Platforms | 0 | 0.34 | 2009 |
On-Line and Off-Line Security Measurement Framework for Mobile Ad Hoc Networks | 4 | 0.41 | 2009 |
A Novel Security Metrics Taxonomy for R&D Organisations | 12 | 1.09 | 2008 |
Architecture Requirements of the Future Internet. | 0 | 0.34 | 2008 |
GEMOM - Significant and Measurable Progress beyond the State of the Art | 16 | 1.11 | 2008 |
Requirement Centric Security Evaluation of Software Intensive Systems | 3 | 0.61 | 2007 |
Practical Security Testing of Telecommunications Software--A Case Study | 0 | 0.34 | 2007 |
Information Security Threats To Mobile Service Development | 0 | 0.34 | 2007 |
A Taxonomy of Information Security for Service-Centric Systems | 15 | 0.83 | 2007 |
Towards a Security Metrics Taxonomy for the Information and Communication Technology Industry | 16 | 1.00 | 2007 |
Security Objectives within a Security Testing Case Study | 3 | 0.64 | 2007 |
Towards a taxonomy for information security metrics | 22 | 1.33 | 2007 |
A requirement centric framework for information security evaluation | 3 | 0.40 | 2006 |
Towards Node-Level Security Management in Self-Organizing Mobile Ad Hoc Networks | 3 | 0.42 | 2006 |
Towards security evaluation based on evidence collection | 0 | 0.34 | 2006 |
Towards Requirement and Modeling Driven Security Evaluation | 2 | 0.45 | 2006 |