DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Misuse case
Misuse case
Effective Software Security Management Choosing the Right Drivers for Applying Application Security
Misuse Case and Security Requirement Analysis for an Application
Using Malware Analysis to Tailor SQUARE for Mobile Platforms
Study on the Evaluation of Risks of Cyber-Incidents and on Costs of Preventing Cyber-Incidents in the Energy Sector Final Report
Cyber Security Guideline for Secure Software
Using Trust Assumptions with Security Requirements
Security Testing with Misuse Case Modeling
Managing Social Engineering Attacks- Considering Human Factors and Security Investment
Advanced Misuse Case Analysis Model with Assets and Security Goals
Detection and Mitigation of Web Application Vulnerabilities Based on Security Testing Taeseung Lee, Giyoun Won, Seongje Cho, Namje Park, Dongho Won
Managing Security Knowledge Through Case Based Reasoning
Developing Abuse Cases Based on Threat Modeling and Attack Patterns
IN2001 Software Engineering Og Prosjektarbeid Vår 2018 Sikker
IMPROVING SECURITY and PRIVACY REQUIREMENT for BUSINESS REGISTRATION SYSTEM (BRS) Siti Fatimah Daud1*, Noraini Che Pa1, Aida Mustapha2, Cik Feresa Mohd Foozy2
Why Crypto-Detectors Fail: a Systematic Evaluation of Cryptographic Misuse Detection Techniques
A4Q Cyber Security Essentials
Computer Security Fundamentals
A Natural Language Programming Approach for Requirements-Based Security Testing
Top View
The Chameleon Attack: Manipulating Content Display in Online Social Media
Visualizing Cyber Attacks with Misuse Case Maps Master of Science Thesis in Software Engineering and Management
Security Testing C# Web Applications
Direct Debit Frauds: a Novel Detection Approach
Modeling Security and Privacy Requirements: a Use Case-Driven Approach
Misuse of Payment Data from Web Skimming
Baseline for Compositional Risk-Based Security Testing
A Private Enforcement Remedy for Information Misuse
Experimental Threat Model Reuse with Misuse Case Diagrams
Security Requirements Engineering: a Framework for Cyber-Physical Systems
Teaching Case IS Security Requirements Identification From
Security Assurance in the SDLC for the Internet of Things
A Systematic Review of Security Requirements Engineering
Implementation of Mosre Framework for a Web Application - a Case Study
Using Capec Attack Patterns for Developing Abuse Cases
Software Verification and Validation Laboratory: Modeling Security And
An Effective Security Requirements Engineering Framework for Cyber-Physical Systems
Defining Security Requirements Through Misuse Actions
Security Requirements Metrics for Pattern-Lock Applications on Mobile Devices
Security Testing Java Web Applications
Mapping the Field of Software Security Metrics
Downloadpublic? Documentids=080166E5d0ebe11a&Appid=PPGMS (Accessed on 16 July 2021)
OWASP Testing Guide
Incorporating Cybersecurity Engineering Within the Discipline of Systems Engineering Chuck Easttom University of Texas at El Paso,
[email protected]
Recognition of Phishing Attacks Utilizing Anomalies in Phishing Websites
Secure Software Lifecycle Knowledge Area (Draft for Comment)
Towards a Hacker Attack Representation Method
Abstract the Misuse Case Methodology Is an Approach For
Evaluation of Field Phishing Study Setup Method
An Extended Misuse Case Notation: Including Vulnerabilities and the Insider Threat
A Threat Modelbased Approach to Security Testing