585 results on '"Fabio Massacci"'
Search Results
102. Vuln4Real: A Methodology for Counting Actually Vulnerable Dependencies
103. An automatic method for assessing the versions affected by a vulnerability.
104. Action, Inaction, Trust, and Cybersecurity's Common Property Problem.
105. Economic Impacts of Rules- versus Risk-Based Cybersecurity Regulations for Critical Infrastructure Providers.
106. Then and Now: On the Maturity of the Cybercrime Markets The Lesson That Black-Hat Marketeers Learned.
107. Security triage: an industrial case study on the effectiveness of a lean methodology to identify security requirements.
108. An Approach for Decision Support on the Uncertainty in Feature Model Evolution.
109. An experiment on comparing textual vs. visual industrial methods for security risk assessment.
110. Programmable enforcement framework of information flow policies.
111. An Empirical Study of the Technology Transfer Potential of EU Security and Trust R&D Projects.
112. NodeSentry: least-privilege library integration for server-side JavaScript.
113. A Relative Cost-Benefit Approach for Evaluating Alternative Airport Security Policies.
114. EMFASE - An Empirical Framework for Security Design and Economic Trade-off.
115. Empirical Assessment of Security Requirements and Architecture: Lessons Learned.
116. An Experimental Comparison of Two Risk-Based Security Methods.
117. Anatomy of Exploit Kits - Preliminary Analysis of Exploit Kits as Software Artefacts.
118. UNICORN: A Tool for Modeling and Reasoning on the Uncertainty of Requirements Evolution.
119. Quantitative Assessment of Risk Reduction with Cybercrime Black Market Monitoring.
120. Evaluation of Airport Security Training Programs: Perspectives and Issues.
121. The (un)reliability of NVD vulnerable versions data: an empirical experiment on Google Chrome vulnerabilities.
122. How to Select a Security Requirements Method? A Comparative Study with Students and Practitioners.
123. An Idea of an Independent Validation of Vulnerability Discovery Models.
124. Crime Pays If You Are Just an Average Hacker.
125. Assessing a requirements evolution approach: Empirical studies in the Air Traffic Management domain.
126. Security-by-Contract for the OSGi Platform.
127. Managing Evolution by Orchestrating Requirements and Testing Engineering Processes.
128. Controlling Application Interactions on the Novel Smart Cards with Security-by-Contract.
129. A preliminary analysis of vulnerability scores for attacks in wild: the ekits and sym datasets.
130. Consolidating Cybersecurity in Europe: A Case Study on Job Profiles Assessment (Dataset)
131. Orchestrating Security and System Engineering for Evolving Systems - (Invited Paper).
132. Predictability of Enforcement.
133. After-Life Vulnerabilities: A Study on Firefox Evolution, Its Vulnerabilities, and Fixes.
134. Computer Aided Threat Identification.
135. Engineering Secure Future Internet Services.
136. A Tool for Managing Evolving Security Requirements.
137. An Extended Ontology for Security Requirements.
138. Dealing with Known Unknowns: Towards a Game-Theoretic Foundation for Software Requirement Evolution.
139. Load Time Security Verification.
140. Managing changes with legacy security engineering processes.
141. A Load Time Policy Checker for Open Multi-application Smart Cards.
142. Computer-Aided Generation of Enforcement Mechanisms for Error-Tolerant Policies.
143. Reactive non-interference for a browser model.
144. A Method for Security Governance, Risk, and Compliance (GRC): A Goal-Process Approach.
145. The Effect of Security Education and Expertise on Security Assessments: the Case of Software Vulnerabilities.
146. Attack Potential in Impact and Complexity.
147. Java Card Architecture for Autonomous Yet Secure Evolution of Smart Cards Applications.
148. Infringo ergo sum: when will software engineering support infringements?
149. SecureChange: Security Engineering for Lifelong Evolvable Systems.
150. Towards Security Climate Forecasts.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.