Security

Web wallet: preventing phishing attacks by revealing user intentions

Author(s): Min Wu, Robert C. Miller, Greg Little
Venue: ACM International Conference Proceeding of the second symposium on Usable privacy and security
Date: 2006

3
Quality

Layered Security Architecture for Threat Management using Multi-Agent System

Author(s): Vandana Gandotra, Archana Archana Singhal, Punam Bedi
Venue: ACM SIGSOFT Software Engineering Notes
Date: September 2011

3
Quality

Injecting and Assessing Cybersecurity Topics Within a Computer Science Program

Author(s): David Voorhees, Aparna Das, Cynthia Choi
Venue: International Conference on Software Engineering
Date: 2017

3
Quality

Security attribute evaluation method: a cost-benefit approach

Author(s): Shawn A. Butler
Venue: ICSE
Date: 2002

3
Quality

Complexity Measures for Secure Service-Oriented Software Architectures

Author(s): Yanguo Liu, Issa Traore
Venue: International Workshop on Predictor Models in Software Engineering
Date: 2007

3
Quality

Empirical Relation between Coupling and Attackability in Software Systems: A Case Study on DOS

Author(s): Yanguo Liu, Issa Traore
Venue: PLAS 06
Date: 2006

3
Quality

Password Memorability and Security: Empirical Results

Author(s): Jeff Yan, Alan Blackwell, Ross Anderson, Alasdair Grant
Venue: IEEE Security & Privacy
Date: 2004

3
Quality

Security Testing Based on Attack Patterns

Author(s): J. Bozic, F. Wotawa
Venue: 2014 IEEE Seventh International Conference on Software Testing
Date: 2014

3
Quality

An Empirical Model to Predict Security Vulnerabilities use Code Complexity Metrics

Author(s): Yongshee Shin, Laurie Williams
Venue: ESEM 08
Date: 2007

3
Quality

Password Security: An Empirical Study

Author(s): Moshe Zviran; William J Haga
Venue: Journal of Management Information Systems
Date: Spring 1999

3
Quality