Mell, Peter
69  Ergebnisse:
Personensuche X
?
2

Empirical Validation of Automated Vulnerability Curation an..:

Okutan, Ahmet ; Mell, Peter ; Mirakhorli, Mehdi...
IEEE Transactions on Software Engineering.  49 (2023)  5 - p. 3241-3260 , 2023
 
?
3

The Generation of Software Security Scoring Systems Leverag..:

, In: 2022 IEEE 29th Annual Software Technology Conference (STC),
Mell, Peter - p. 116-124 , 2022
 
?
 
?
5

A Suite of Metrics for Calculating the Most Significant Sec..:

, In: 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC),
Mell, Peter ; Gueye, Assane - p. 511-516 , 2020
 
?
6

Measurements of the Most Significant Software Security Weak..:

, In: Annual Computer Security Applications Conference,
 
?
7

Measuring and Improving the Effectiveness of Defense-in-Dep..:

, In: Proceedings of the 2nd Annual Industrial Control System Security Workshop,
Mell, Peter ; Shook, James ; Harang, Richard - p. 15-22 , 2016
 
?
8

Restricting Insider Access Through Efficient Implementation..:

, In: Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats,
 
?
 
?
10

What's Special about Cloud Security?:

Mell, Peter
IT Professional.  14 (2012)  4 - p. 6-8 , 2012
 
?
11

Big data technology and implications for security research:

, In: Proceedings of the 2012 ACM Workshop on Building analysis datasets and gathering experience returns for security,
Mell, Peter - p. 15-16 , 2012
 
?
12

State of security readiness:

Chandramouli, Ramaswamy ; Mell, Peter
XRDS: Crossroads, The ACM Magazine for Students.  16 (2010)  3 - p. 23-25 , 2010
 
?
14

Vulnerability scoring for security configuration settings:

, In: Proceedings of the 4th ACM workshop on Quality of protection,
Scarfone, Karen ; Mell, Peter - p. 3-8 , 2008
 
?
15

Common Vulnerability Scoring System:

Mell, Peter ; Scarfone, Karen ; Romanosky, Sasha
IEEE Security and Privacy Magazine.  4 (2006)  6 - p. 85-89 , 2006
 
1-15