Model-based security metrics using adversary view security evaluation (advise) E LeMay, MD Ford, K Keefe, WH Sanders, C Muehrcke 2011 Eighth International Conference on Quantitative Evaluation of SysTems …, 2011 | 237 | 2011 |
Adversary-driven state-based system security evaluation E LeMay, W Unkenholz, D Parks, C Muehrcke, K Keefe, WH Sanders Proceedings of the 6th International Workshop on Security Measurements and …, 2010 | 115 | 2010 |
Modeling peer-to-peer botnets E Van Ruitenbeek, WH Sanders 2008 Fifth International Conference on Quantitative Evaluation of Systems …, 2008 | 76 | 2008 |
Implementing the ADVISE security modeling formalism in Möbius MD Ford, K Keefe, E LeMay, WH Sanders, C Muehrcke 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2013 | 49 | 2013 |
Quantifying the effectiveness of mobile phone virus response mechanisms E Van Ruitenbeek, T Courtney, WH Sanders, F Stevens 37th Annual IEEE/IFIP International Conference on Dependable Systems and …, 2007 | 46 | 2007 |
The common misuse scoring system (CMSS): Metrics for software feature misuse vulnerabilities E LeMay, KA Kent, P Mell US Department of Commerce, National Institute of Standards and Technology, 2012 | 24 | 2012 |
The common misuse scoring system (CMSS): Metrics for software feature misuse vulnerabilities E Van Ruitenbeek, KA Kent US Department of Commerce, National Institute of Standards and Technology, 2009 | 8 | 2009 |
Modeling Mobile Phone Virus Propagation to Quantify Response Mechanism Effectiveness EA Van Ruitenbeek University of Illinois at Urbana-Champaign, 2008 | | 2008 |
Reducing the Power Consumption Due to CAM Usage in Dynamic Scheduling Hardware X Zhang, JM Chabas, E Van Ruitenbeek | | |