On Security Development Lifecycle: Conceptual Description of Vulnerabilities, Risks, and Threats
暂无分享,去创建一个
[1] Keith Brown. The .NET Developer's Guide to Windows Security (Microsoft Net Development Series) , 2004 .
[2] Sabah AlFedaghi,et al. Evolution of Data into an Information Hierarchy , 2011 .
[3] Edward D. Lazowska,et al. Cyber Security: A Crisis of Prioritization , 2005 .
[4] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[5] Salama A. Mostafa,et al. Implementing Case-Based Reasoning Technique to Software Requirements Specifications Quality Analysis , 2011 .
[6] Sabah Al-Fedaghi. A Conceptual Foundation for Data Loss Prevention , 2011 .
[7] Jan Jürjens,et al. Developing Secure Systems with UMLsec — From Business Processes to Implementation , 2001 .
[8] Axel van Lamsweerde,et al. Elaborating security requirements by construction of intentional anti-models , 2004, Proceedings. 26th International Conference on Software Engineering.
[9] Frank Swiderski,et al. Threat Modeling , 2018, Hacking Connected Cars.
[10] Marwan Abi-Antoun,et al. Checking threat modeling data flow diagrams for implementation conformance and security , 2007, ASE.
[11] Gao Yang,et al. Evaluating Vulnerabilities Quantitatively Based On the Rank of Web Services Confidentiality , 2011 .