Security

Security attribute evaluation method: a cost-benefit approach

Author(s): Shawn A. Butler
Venue: ICSE
Date: 2002

3
Quality

Complexity Measures for Secure Service-Oriented Software Architectures

Author(s): Yanguo Liu, Issa Traore
Venue: International Workshop on Predictor Models in Software Engineering
Date: 2007

3
Quality

Empirical Relation between Coupling and Attackability in Software Systems: A Case Study on DOS

Author(s): Yanguo Liu, Issa Traore
Venue: PLAS 06
Date: 2006

3
Quality

Password Memorability and Security: Empirical Results

Author(s): Jeff Yan, Alan Blackwell, Ross Anderson, Alasdair Grant
Venue: IEEE Security & Privacy
Date: 2004

3
Quality

Security Testing Based on Attack Patterns

Author(s): J. Bozic, F. Wotawa
Venue: 2014 IEEE Seventh International Conference on Software Testing
Date: 2014

3
Quality

An Empirical Model to Predict Security Vulnerabilities use Code Complexity Metrics

Author(s): Yongshee Shin, Laurie Williams
Venue: ESEM 08
Date: 2007

3
Quality

Password Security: An Empirical Study

Author(s): Moshe Zviran; William J Haga
Venue: Journal of Management Information Systems
Date: Spring 1999

3
Quality

USEable Security: Interface Design Strategies for Improving Security

Author(s): Amanda L. Stephano, Dennis P. Groth
Venue: 3rd International Workshop on Visualization for Computer Security
Date: 2006

3
Quality

IccTA: Detecting Inter-Component Privacy Leaks in Android Apps

Author(s): Li Li, Alexandre Bartel, Tegawende F. Bissyand, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, Patrick McDaniel
Venue: IEEE International Conference on Software Engineering
Date: 2015

3
Quality

Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection

Author(s): Ramona Su Thompson, Esa M. Rantanen, William Yurcik, Brian P. Bailey
Venue: Conference on Human Factors in Computing Systems
Date: 2007

3
Quality