Obserwuj
Elizabeth LeMay
Elizabeth LeMay
Nieznane powiązanie
Zweryfikowany adres z lemays.org
Tytuł
Cytowane przez
Cytowane przez
Rok
Model-based security metrics using adversary view security evaluation (advise)
E LeMay, MD Ford, K Keefe, WH Sanders, C Muehrcke
2011 Eighth International Conference on Quantitative Evaluation of SysTems …, 2011
2372011
Adversary-driven state-based system security evaluation
E LeMay, W Unkenholz, D Parks, C Muehrcke, K Keefe, WH Sanders
Proceedings of the 6th International Workshop on Security Measurements and …, 2010
1152010
Modeling peer-to-peer botnets
E Van Ruitenbeek, WH Sanders
2008 Fifth International Conference on Quantitative Evaluation of Systems …, 2008
762008
Implementing the ADVISE security modeling formalism in Möbius
MD Ford, K Keefe, E LeMay, WH Sanders, C Muehrcke
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2013
492013
Quantifying the effectiveness of mobile phone virus response mechanisms
E Van Ruitenbeek, T Courtney, WH Sanders, F Stevens
37th Annual IEEE/IFIP International Conference on Dependable Systems and …, 2007
462007
The common misuse scoring system (CMSS): Metrics for software feature misuse vulnerabilities
E LeMay, KA Kent, P Mell
US Department of Commerce, National Institute of Standards and Technology, 2012
242012
The common misuse scoring system (CMSS): Metrics for software feature misuse vulnerabilities
E Van Ruitenbeek, KA Kent
US Department of Commerce, National Institute of Standards and Technology, 2009
82009
Modeling Mobile Phone Virus Propagation to Quantify Response Mechanism Effectiveness
EA Van Ruitenbeek
University of Illinois at Urbana-Champaign, 2008
2008
Reducing the Power Consumption Due to CAM Usage in Dynamic Scheduling Hardware
X Zhang, JM Chabas, E Van Ruitenbeek
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–9