Security Measurement
- Abdi, A.; Souzani, A.; Amirfakhri, M.; Moghadam, A.B.: Using security metrics in software quality assurance process. Sixth International Symposium on Telecommunications (IST), 2012 , pp. 1099 - 1102
- Anderson, R.: Security Engineering - A Guide to Building Dependable Distributed Systems. John Wiley & Sons Publ., 2001
- Beck, A.: Konzeption und Entwicklung einer zentralen Validation-Authority beim Volkswagen Konzern. Master Thesis, University of Magdeurg, 2011
- Cheng, X.; He, N.; Hsiao, M.S.: A New Security Sensitivity Measurement for Software Variables. IEEE Conference on Technologies for Homeland Security, 2008, pp. 593-598
- Erdoğan T. and Tarhan A.: Process Mining for Healthcare Process Analytics. Heidrich, J.; Vogelezang, F. (Eds.): IWSM/Mensura 2016, IEEE Computer Society, CPS, pp. 125-130
- Eckerson W. W.: Performance Dashboards: Measuring, Monitoring, and Managing Your Business. John Wiley & Sons Inc., 2010
- Günther, D.: Efficiency and Appropriateness of Security-Oriented Information Systems. Internal Research Paper, VW AG,Wolfsburg, Germany, 2011
- Günther, D.; Dumke, R.: Security Process Integration. In: Büren et al.: Metrikon 2012 - Praxis der Software-Messung, Shaker-Verlag 2012, S. 49-52
- Günther, D., Mews, G.: Security Engineering für E-Commerce-Anwendungen. Diploma Thesis, University of Magdeburg, Germany, 2002
- Hanebutte, N.: Analysis of Security and Survivability as Software Quality Attributes. PhD at University of Idaho, 2004
- Hassler, V.: Security Fundamentals for E-Commerce. Artech House Publ., 2001
- Hatzivasilis G.; Papaefstathiou I.; Manifavas C.: Software Security, Privacy, and Dependability: Metrics and Measurement. IEEE Software, 33(2016)4, pp. 46-54
- Henrique Alves; Baldoino Fonseca; Nuno Antunes: Software Metrics and Security Vulnerabilities: Dataset and Exploratory Study. 2016 12th European Dependable Computing Conference (EDCC), pp. 37-44
- Kerzner H. R.: Project Management Metrics, KPIs, and Dashboards: A Guide to Measuring and Monitoring Project Performance. John Wiley & Sons Inc., 2013
- Hussein, A.A.: A Valicating Framework for Business Process Based on a Defined Enterprise Security Ontology. In: A. Schmietendorf; C. Bartsch; R.R. Dumke: 5. Workshop Bewertungsaspekte serviceorientierter Architekturen (BSOA 2010), 9. November 2010, Karlsruhe, Shaker Verlag Aachen, S. 121-122
- Hussein, A.; Dumke, R.: A Dynamic Modular Framework for Enhancing the Security of Enterprise Business Processes. In: Schmietendorf/Patzer: BSOA 2012 - 7. Workshop Bewertungsaspekte serviceorientierter Architekuren, Shaker-Verlag, 2012, S. 127-136
- Hussein, A.; Dumke, R.; Wille, C.: Modeling the Behavior of Business Processes - Security Enhancement Framework. In: Büren et al.: Metrikon 2012 - Praxis der Software-Messung, Shaker-Verlag 2012, S. 53-68
- Katzenbeisser, S.; Petitcolas, F. A. P.: Information Hiding - techniques for steganography and digital watermaking. Artech House Publ., 2000
- Khurshid, S.: Tool Support for ISO/IEC 27001 based IT Security Self Assessment. Master Thesis, University of Magdeburg, Dept. of Computer Science, 2009
- Köppel, R.: Entwicklung eines generischen Prozessmodells für den Test, die Verifikation und die Validation sicherheitsrelevanter Systeme. Diploma Thesis, University of Magdeburg, Germany, 2004
- Kramer F., Wirth M., Klinger S., Becker M., Friedrich J., Schneider M..: Zum Nutzen toolbasierter Wissensmanagementprozesse. Schmietendorf, A.; Simon, F. (Eds.):: BSOA/BCLOUD 2016, Shaker-Verlag, Aachen, 2016
- Lai, S.: An Analyzer-Based Software Security Measurement Model for Enhancing Software System Security. Second World Congress onSoftware Engineering (WCSE), 2010, pp. 93-96
- Oppliger, R.: Security Technologies for the World Wide Web. Artech House Publ., 2000
- Phoha, V. V.: Internet Security Dictionary. Springer Publ., 2002
- Rubin, A. D.; Geer, D. E.: A Survey of Web Security. IEEE Computer, September 1998, S. 34-41
- Trojahn, M.: Softwareunterstützte Entscheidungsfindung für authentisierten Zugang in IT-Infrastrukturen aus ungesicherten Medien. Master Thesis, Universty of Magdeburg, Germany, 2011
- Wunderlich, K.: Prozessdesign für IT-forensische Untersuchungen (Post-mortem-Analysen). Master Thesis, University of Magdeurg, 2011
- Yakin C.: Evolution of Process and Product Metrics Based on Information Needs. Heidrich, J.; Vogelezang, F. (Eds.): IWSM/Mensura 2016, IEEE Computer Society, CPS, pp. 22
- Zeiler, F.: Konzeption und Evaluierung einer Kommunikationsstrategie für die IT-Sicherheit auf firmenspezifischer, internationaler Ebene. Master Thesis, University of Magdeurg, 2011