Security Measurement

  1. Abdi, A.; Souzani, A.; Amirfakhri, M.; Moghadam, A.B.: Using security metrics in software quality assurance process. Sixth International Symposium on Telecommunications (IST), 2012 , pp. 1099 - 1102
  2. Anderson, R.: Security Engineering - A Guide to Building Dependable Distributed Systems. John Wiley & Sons Publ., 2001
  3. Beck, A.: Konzeption und Entwicklung einer zentralen Validation-Authority beim Volkswagen Konzern. Master Thesis, University of Magdeurg, 2011
  4. Cheng, X.; He, N.; Hsiao, M.S.: A New Security Sensitivity Measurement for Software Variables. IEEE Conference on Technologies for Homeland Security, 2008, pp. 593-598
  5. Erdoğan T. and Tarhan A.: Process Mining for Healthcare Process Analytics. Heidrich, J.; Vogelezang, F. (Eds.): IWSM/Mensura 2016, IEEE Computer Society, CPS, pp. 125-130
  6. Eckerson W. W.: Performance Dashboards: Measuring, Monitoring, and Managing Your Business. John Wiley & Sons Inc., 2010
  7. Günther, D.: Efficiency and Appropriateness of Security-Oriented Information Systems. Internal Research Paper, VW AG,Wolfsburg, Germany, 2011
  8. Günther, D.; Dumke, R.: Security Process Integration. In: Büren et al.: Metrikon 2012 - Praxis der Software-Messung, Shaker-Verlag 2012, S. 49-52
  9. Günther, D., Mews, G.: Security Engineering für E-Commerce-Anwendungen. Diploma Thesis, University of Magdeburg, Germany, 2002
  10. Hanebutte, N.: Analysis of Security and Survivability as Software Quality Attributes. PhD at University of Idaho, 2004
  11. Hassler, V.: Security Fundamentals for E-Commerce. Artech House Publ., 2001
  12. Hatzivasilis G.; Papaefstathiou I.; Manifavas C.: Software Security, Privacy, and Dependability: Metrics and Measurement. IEEE Software, 33(2016)4, pp. 46-54
  13. Henrique Alves; Baldoino Fonseca; Nuno Antunes: Software Metrics and Security Vulnerabilities: Dataset and Exploratory Study. 2016 12th European Dependable Computing Conference (EDCC), pp. 37-44
  14. Kerzner H. R.: Project Management Metrics, KPIs, and Dashboards: A Guide to Measuring and Monitoring Project Performance. John Wiley & Sons Inc., 2013
  15. Hussein, A.A.: A Valicating Framework for Business Process Based on a Defined Enterprise Security Ontology. In: A. Schmietendorf; C. Bartsch; R.R. Dumke: 5. Workshop Bewertungsaspekte serviceorientierter Architekturen (BSOA 2010), 9. November 2010, Karlsruhe, Shaker Verlag Aachen, S. 121-122
  16. Hussein, A.; Dumke, R.: A Dynamic Modular Framework for Enhancing the Security of Enterprise Business Processes. In: Schmietendorf/Patzer: BSOA 2012 - 7. Workshop Bewertungsaspekte serviceorientierter Architekuren, Shaker-Verlag, 2012, S. 127-136
  17. Hussein, A.; Dumke, R.; Wille, C.: Modeling the Behavior of Business Processes - Security Enhancement Framework. In: Büren et al.: Metrikon 2012 - Praxis der Software-Messung, Shaker-Verlag 2012, S. 53-68
  18. Katzenbeisser, S.; Petitcolas, F. A. P.: Information Hiding - techniques for steganography and digital watermaking. Artech House Publ., 2000
  19. Khurshid, S.: Tool Support for ISO/IEC 27001 based IT Security Self Assessment. Master Thesis, University of Magdeburg, Dept. of Computer Science, 2009
  20. Köppel, R.: Entwicklung eines generischen Prozessmodells für den Test, die Verifikation und die Validation sicherheitsrelevanter Systeme. Diploma Thesis, University of Magdeburg, Germany, 2004
  21. Kramer F.,  Wirth M., Klinger S., Becker M., Friedrich J., Schneider M..: Zum Nutzen toolbasierter Wissensmanagementprozesse. Schmietendorf, A.; Simon, F. (Eds.):: BSOA/BCLOUD 2016, Shaker-Verlag, Aachen, 2016
  22. Lai, S.: An Analyzer-Based Software Security Measurement Model for Enhancing Software System Security. Second World Congress onSoftware Engineering (WCSE), 2010, pp. 93-96
  23. Oppliger, R.: Security Technologies for the World Wide Web. Artech House Publ., 2000
  24. Phoha, V. V.: Internet Security Dictionary. Springer Publ., 2002
  25. Rubin, A. D.; Geer, D. E.: A Survey of Web Security. IEEE Computer, September 1998, S. 34-41
  26. Trojahn, M.: Softwareunterstützte Entscheidungsfindung für authentisierten Zugang in IT-Infrastrukturen aus ungesicherten Medien. Master Thesis, Universty of Magdeburg, Germany, 2011
  27. Wunderlich, K.: Prozessdesign für IT-forensische Untersuchungen (Post-mortem-Analysen). Master Thesis, University of Magdeurg, 2011
  28. Yakin C.: Evolution of Process and Product Metrics Based on Information Needs. Heidrich, J.; Vogelezang, F. (Eds.): IWSM/Mensura 2016, IEEE Computer Society, CPS, pp. 22
  29. Zeiler, F.: Konzeption und Evaluierung einer Kommunikationsstrategie für die IT-Sicherheit auf firmenspezifischer, internationaler Ebene. Master Thesis, University of Magdeurg, 2011