Home > Research > Browse

Results for Security metrics

Publications & Outputs

  1. Contextualising and aligning security metrics and business objectives: A GQM-based methodology

    Philippou, E., Frey, S. & Rashid, A., 31/01/2020, In: Computers and Security. 88, 15 p., 101634.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Quantitative Reasoning about Cloud Security Using Service Level Agreements

    Luna, J., Taha, A., Trapero, R. & Suri, N., 1/07/2017, In: IEEE Transactions on Cloud Computing. 5, 3, p. 457-471 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Novel efficient techniques for real-time cloud security assessment

    Modic, J., Trapero, R., Taha, A., Luna, J., Stopar, M. & Suri, N., 1/09/2016, In: Computers and Security. 62, p. 1-18 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. A survey of cyber security management in industrial control systems

    Knowles, W., Prince, D. D. C., Hutchison, D., Disso, J. F. P. & Jones, K., 1/06/2015, In: International Journal of Critical Infrastructure Protection. 9, p. 52-80 29 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. SecLA-based negotiation and brokering of cloud resources

    Luna, J., Vateva-Gurova, T., Suri, N., Rak, M. & De Benedictis, A., 2014, Cloud Computing and Services Science: Third International Conference, CLOSER 2013, Aachen, Germany, May 8-10, 2013, Revised Selected Papers. Springer-Verlag, Vol. 453. p. 1-18 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  6. User-centric security assessment of software configurations: A case study

    Ghani, H., Luna Garcia, J., Petkov, I. & Suri, N., 2014, Engineering Secure Software and Systems: 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings. Springer-Verlag, Vol. 8364 LNCS. p. 196-212 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Quantitative assessment of software vulnerabilities based on economic-driven security metrics

    Ghani, H., Luna, J. & Suri, N., 23/10/2013, 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS). IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Negotiating and brokering Cloud resources based on Security Level Agreements

    Luna, J., Vateva-Gurova, T., Suri, N., Rak, M. & Liccardo, L., 2013, Proceedings of the 3rd International Conference on Cloud Computing and Services Science - Volume 1. SciTePress, p. 533-541 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Benchmarking cloud security level agreements using quantitative policy trees

    Luna, J., Langenberg, R. & Suri, N., 19/10/2012, Proceedings of the 2012 ACM Workshop on Cloud computing security workshop. ACM, p. 103-112 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Quantitative assessment of Cloud Security Level Agreements: A case study

    Luna, J., Ghani, H., Vateva, T. & Suri, N., 2012, Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, 2012, Rome, Italy. SciTePress, p. 64-73 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. A security metrics framework for the Cloud

    Luna, J., Ghani, H., Germanus, D. & Suri, N., 18/07/2011, Proceedings of the International Conference on Security and Cryptography 2011. IEEE, p. 245-250 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

More results »